From 68db1b4a9128f5d831eff737f7ad9ce74b5b1ebe Mon Sep 17 00:00:00 2001 From: sergey-wowwow <15173437+sergey-wowwow@users.noreply.github.com> Date: Sat, 12 Sep 2020 00:33:20 +0300 Subject: [PATCH] Update README.md --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index d60b321..2892f8f 100644 --- a/README.md +++ b/README.md @@ -8,6 +8,7 @@ Maintained by [@vaib25vicky](https://twitter.com/vaib25vicky) with contributions ### General - Blogs, Papers, How To's +* [TikTok: three persistent arbitrary code executions and one theft of arbitrary files](https://blog.oversecured.com/Oversecured-detects-dangerous-vulnerabilities-in-the-TikTok-Android-app/) * [Persistent arbitrary code execution in Android's Google Play Core Library: details, explanation and the PoC - CVE-2020-8913](https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/) * [Android: Access to app protected components](https://blog.oversecured.com/Android-Access-to-app-protected-components/) * [Android: arbitrary code execution via third-party package contexts](https://blog.oversecured.com/Android-arbitrary-code-execution-via-third-party-package-contexts/)