@cyx0d Profile picture

cyx

@cyx0d

life is too short to hide your 0days

Similar User
batcain photo

@batcain_

Furkan Öztürk photo

@furk4n0zturk

Yusuf Can Çakır photo

@Yusufcancakiir

meto photo

@meto0x3d

Berk Albayrak photo

@brkalbyrk7

Eren photo

@aporlorxl23

𝚎𝚌𝚑𝚎𝚕𝚘𝚗 photo

@echel0n_1881

ty photo

@_theatha

Utku Çorbacı photo

@rhotav

sh4d0wless photo

@sh4d0wlesss

Nur photo

@1umos_

Mutlu Dönmez photo

@mutluexe

Devo photo

@fatkz123

not alice 3301 photo

@ambiguousmind_

Hüseyin Orçun KARATAŞ photo

@h0rcun

Pinned

Hellooo Hackers! In this tweet we overwrite some memory. ( Thanks for all! @Zardus & @TheConnorNelson )

Tweet Image 1

cyx Reposted

Jaewon Min(@binerdd ) & Kaan Ezder(@kaanezder) Fake it till you make it: Bypassing V8 Sandbox by constructing a fake Isolate powerofcommunity.net/poc2024/Jaewon…


cyx Reposted

OOB write in SkSLRasterPipelineBuilder (reward: $10000) crbug.com/355465305


cyx Reposted

Analyzing Firefox Animation CVE-2024-9680 dimitrifourny.github.io/2024/11/14/fir…


cyx Reposted

AddressSanitizer: heap-buffer-overflow (reward: $7000) crbug.com/352467338


cyx Reposted

#POC2024 Jaewon Min & Kaan Ezder(@binerdd, @kaanezder) Fake it till you make it: Bypassing V8 Sandbox by constructing a fake Isolate 🏎

Tweet Image 1
Tweet Image 2

cyx Reposted

UAF in blink::AudioBus::Zero() (reward: $3000) crbug.com/354847246


cyx Reposted

Webtransport session close crashes browser tab (reward: $7000) crbug.com/352872238


cyx Reposted

(CVE-2024-5493)[339877165][AV1]heap-BoF write is now public with repro issues.chromium.org/issues/3398771… ./chrome --disable-gpu --use-fake-ui-for-media-stream --use-fake-device-for-media-stream --incognito --user-data-dir=/tmp/xxs http://localhost:8880/crash.html @cassidy6564

(CVE-2024-5493)[339877165][AV1]Initialize encoder with specific settings -> start encoding video -> change resolution/SVC layers dynamically -> desynchronized buffer allocation -> Heap BoF during encoding aomedia.googlesource.com/aom.git/+/d3cc… Repro: aomedia.googlesource.com/aom.git/+/ad69… @cassidy6564



cyx Reposted

Safe C++ // by Sean Baxter and Christian Mazakas open-std.org/jtc1/sc22/wg21… #cpp #memorysafety


cyx Reposted

[POC2024] SPEAKER UPDATE 1⃣5⃣ 👥 @binerdd & @kaanezder - "Fake it till you make it: Bypassing V8 Sandbox by constructing a fake Isolate" #POC2024

Tweet Image 1

cyx Reposted

At the KazHackStan event held in Kazakhstan between September 10-14, with the support of @BlackboxSecTR , we took 3rd place in the CTF event we participated under the name PeakEye. I would like to thank the KazHackStan team and my teammates (@bugraeskici , @numanturle ,…

Tweet Image 1

cyx Reposted

Since the issue of CVE-2024-5274 is public now, we can finally release our research from months ago. This is a rare vulnerability in the V8 Parser module, and we were surprised to find that our exploit method coincidentally aligns with the ITW exploit😅 blog.darknavy.com/blog/cve_2024_…


cyx Reposted

Security: [0-day] V8 Incorrect parsing leads to type confusions crbug.com/341663589


cyx Reposted

CVE-2024-7971 #itw #chrome #0day #POC

Tweet Image 1

cyx Reposted

Google Chrome In-The-Wild Type Confusion in V8 (CVE-2024-7971 [360700873]) happens when handling loop inputs inside WASM baseline (A.K.A Liftoff) compiler/assembler: chromium-review.googlesource.com/c/v8/v8/+/5797…


cyx Reposted

[343407073][$5000] V8 Sandbox Bypass: control-flow hijacking via WASM Table Indirect call issues.chromium.org/issues/3434070… V8 sbx ecape technique(writeup): issues.chromium.org/action/issues/… ./d8 --sandbox-testing sbx_bypass.js issues.chromium.org/action/issues/… @le_douds @ga1ois

[slides]Let the Cache Cache and Let the WebAssembly Assemble: Knockin' on Chrome's Shell i.blackhat.com/BH-US-24/Prese… @ga1ois @le_douds



cyx Reposted

In this post I'll use CVE-2024-5830, a bug in object transitions in Chrome to gain RCE in the Chrome renderer sandbox: github.blog/security/vulne…


cyx Reposted

[334120897][$6000]Wasm function signature confusion -> out of sandbox arbitrary r/w(v8sbx escape, crashing instruction is `mov [rcx+rax], rdx` so the target page won't appear in the registers (rcx+rax == target_page)) issues.chromium.org/issues/3341208… Kyle Zeng

Tweet Image 1
Tweet Image 2
Tweet Image 3

🤔 [334120897][wasm][sandbox]In-sandbox corruption could cause i64 values to be passed to functions expecting an i32 -> SBX: chromium-review.googlesource.com/c/v8/v8/+/5494… Regress test: ./d8 --wasm-staging --sandbox-testing regress-334120897.js github.com/v8/v8/blob/594…



cyx Reposted

#BHUSA The topic, "Super Hat Trick: Exploit Chrome and Firefox Four Times", between me and Zhenghang has come to an end. Thank all the audiences on the spot for participating in our topic sharing. The white paper and PPT are now available to the public. blackhat.com/us-24/briefing…


Loading...

Something went wrong.


Something went wrong.