Projects STRLCPY 0days-in-the-wild Files
🤬
15 lines | UTF-8 | 1 KB

layout: rca-home title: Root Cause Analyses

Originally published by Maddie Stone on the Google Project Zero blog on 27 July 2020

Beginning in 2019, Project Zero began a program to systematically study 0-day exploits that are used in the wild. It’s another way we’re trying to make 0-day hard. We published our tracking spreadsheet for recording publicly known cases of detected 0-day exploits. Today we’re beginning to share the root cause analyses we perform on these detected 0-day exploits. To better understand our approach and reasoning behind these analyses, please read this blog post.

We will continue to publish new root cause analyses as they are completed, hopefully in a very timely manner. We hope other researchers who detect and/or analyze 0-day exploits will also publish this information to better inform actions and decision making in the security and tech communities. The template that we use is available here. We welcome pull requests!

Our goal is that this information helps the security and technical communities. Please reach out with any feedback or suggestions.

Please wait...
Page is in error, reload to recover