|
EN | PL |
[ Oferta ] [ Blog ] [ Nasze Publikacje ] [ O Nas ]    |
|
In addition to offering penetration testing services members of Z-Labs are commited to conduct independent security research and development to constanly improve its R&D capabilities |
[ Nasze znaleziska ] In addition to discovering security issues and design flaws in properitary software for our clients, Z-Labs occasionally conducts its own vulnerability research on chosen open source software and performs other security research related activities. :: Discovery of CVE-2017-17858 vulnerability - multiple memory corruptions during pdf processing Software affected: MuPDF (ver. 1.12.0) :: Discovery of CVE-2015-3146 vulnerability - DoS condition (server-side NULL pointer dereference) Software affected: libssh (ver. < 0.6.5) :: Discovery of CVE-2015-1782 vulnerability - remote out-of-bounds memory read Software affected: libssh2 (ver. <= 1.4.3) [ Nasze narzędzia ] At Z-Labs a lot of code is written: PoC exploits, custom fuzzers and other custom-written scripts. We release some of them to share with the community. :: linux-exploit-suggester - Linux privilege escalation auditing tool Written to aid a security analyst in uncovering known and exploitable vulnerabilities in Linux kernel. :: Exploits ported to Nmap Lua scripts contributed by us to Nmap network scanner. [ Nasze publikacje ] Ops-Sec for Penetration Testers and Red Team Operators - comming soon. |
Copyright (c) 2018-2022 Z-Labs