Listen

Description

Malicious DAA Attachments

https://isc.sans.edu/forums/diary/Malicious+DAA+Attachments/25230/

SQLLite Exploits

https://research.checkpoint.com/select-code_execution-from-using-sqlite/

Printer Vulnerabilities

https://www.defcon.org/html/defcon-27/dc-27-speakers.html#Romero

https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/?research=Technical+advisories