Cisco Blogs
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select

Tetrane

August 2, 2018

THREAT RESEARCH

Exploitable or Not Exploitable? Using REVEN to Examine a NULL Pointer Dereference.

1 min read

It can be very time-consuming to determine if a bug is exploitable or not. In this post, we’ll show how to decide if a vulnerability is exploitable by tracing back...