Stay updated with the latest cybersecurity insights, offensive security techniques, and industry news delivered directly to your inbox every week.
Remote code execution via insecure deserialization (no authentication) CVSS: 10.0
Remote code execution via ZIP files with malicious symbolic links
Kernel privilege elevation (actively exploited)
Bypassing system protections by malicious apps
Use-After-Free (listed in the CISA catalog of exploited vulnerabilities)