Login
From:
RET2 Systems Blog
(Uncensored)
subscribe
Exploiting an Unbounded memcpy in Parallels Desktop | RET2 Systems Blog
https://blog.ret2.io/2022/05/19/pwn2own-2021-parallels-desktop-exploit/
links
backlinks
Roast topics
Find topics
Find it!
This post details the development of a guest-to-host virtualization escape for Parallels Desktop on macOS, as used in our successful Pwn2Own 2021 entry. Give...