oldfresher's profile picture.

Guang Gong

@oldfresher

Guang Gong reposted

Whoah... $250000 (CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -> renderer duplicate browser process handle -> escape sbx is now open with PoC & exploit(success rate is nearly 70%-80%) issues.chromium.org/issues/4125787… issues.chromium.org/issues/4125787…

xvonfers's tweet image. Whoah... $250000

(CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -> renderer duplicate browser process handle -> escape sbx is now open with PoC & exploit(success rate is nearly 70%-80%)
issues.chromium.org/issues/4125787…
issues.chromium.org/issues/4125787…

(CVE-2025-4609)[412578726][Mojo][IpczDriver]Incorrect handle provided in unspecified circumstances chromium-review.googlesource.com/c/chromium/src… Reported by Micky on 2025-04-22

xvonfers's tweet image. (CVE-2025-4609)[412578726][Mojo][IpczDriver]Incorrect handle provided in unspecified circumstances
chromium-review.googlesource.com/c/chromium/src…

Reported by Micky on 2025-04-22


Guang Gong reposted

Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab #CVE-2025-24200 👉 blog.quarkslab.com/first-analysis…

quarkslab's tweet image. Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab #CVE-2025-24200 👉 blog.quarkslab.com/first-analysis…

Guang Gong reposted

ChatGPT Account Takeover - Wildcard Web Cache Deception : nokline.github.io/bugbounty/2024… credits @H4R3L Ref : Shockwave Identifies Web Cache Deception and Account Takeover Vulnerability affecting OpenAI's ChatGPT : shockwave.cloud/blog/shockwave…

binitamshah's tweet image. ChatGPT Account Takeover - Wildcard Web Cache Deception : nokline.github.io/bugbounty/2024… credits @H4R3L 

Ref : 
Shockwave Identifies Web Cache Deception and Account Takeover Vulnerability affecting OpenAI's ChatGPT : 
shockwave.cloud/blog/shockwave…

Guang Gong reposted

前几天的Telegram的RCE应该是这个:TG桌面客户端由于拼写错误,将Python zipapp的扩展名pyzw写成pywz(.pyzw是Windows的可执行文件),导致TG客户端打开对应文件不会有安全警告,将会直接执行指定文件 感谢@VulkeyChen师傅提供的资料 Github链接:github.com/telegramdeskto…

AabyssZG's tweet image. 前几天的Telegram的RCE应该是这个:TG桌面客户端由于拼写错误,将Python zipapp的扩展名pyzw写成pywz(.pyzw是Windows的可执行文件),导致TG客户端打开对应文件不会有安全警告,将会直接执行指定文件
感谢@VulkeyChen师傅提供的资料
Github链接:github.com/telegramdeskto…

Telegram 官方一个拼写错误,导致的另一个文件格式绕过执行漏洞。 注意更新、注意安全 @evilcos @1nf0s3cpt check👇

im23pds's tweet image. Telegram 官方一个拼写错误,导致的另一个文件格式绕过执行漏洞。
注意更新、注意安全
@evilcos @1nf0s3cpt check👇
im23pds's tweet image. Telegram 官方一个拼写错误,导致的另一个文件格式绕过执行漏洞。
注意更新、注意安全
@evilcos @1nf0s3cpt check👇
im23pds's tweet image. Telegram 官方一个拼写错误,导致的另一个文件格式绕过执行漏洞。
注意更新、注意安全
@evilcos @1nf0s3cpt check👇


Guang Gong reposted

We uploaded a backdoored AI model to @HuggingFace which we could use to potentially access other customers’ data✨ Here is how we did it - and collaborated with Hugging Face to fix it 🧵⬇️

sagitz_'s tweet image. We uploaded a backdoored AI model to @HuggingFace which we could use to potentially access other customers’ data✨

Here is how we did it - and collaborated with Hugging Face to fix it 🧵⬇️

Guang Gong reposted

Seems that folks successfully achieved working RCE w/ a previous RTF/Win exploit! This is expected as #MonikerLink is a powerful attack vector (delivering exp) on Outlook - it bypasses Protected View too! Now u have more reasons to PATCH & GET PROTECTED!

⚠️ Update for CVE-2024-21413 💣 Managed & confirmed Microsoft Outlook Remote Code Execution (RCE) but won't publish details (yet).



Guang Gong reposted

KernelGPT: Enhanced Kernel Fuzzing via Large Language Models A paper by @cy1yang et. al about using the GPT4 LLM neural network for automatically generating syzkaller descriptions. arxiv.org/pdf/2401.00563…

linkersec's tweet image. KernelGPT: Enhanced Kernel Fuzzing via Large Language Models

A paper by @cy1yang et. al about using the GPT4 LLM neural network for automatically generating syzkaller descriptions.

arxiv.org/pdf/2401.00563…

Guang Gong reposted

With Japan COVID cases around 200k, don't think immigration restrictions will allow international conferences. No PacSec in Tokyo this year :-( , back next year I hope. On line trainings at secwest.net this fall tho. There will be a fall PWN2OWN tba.



Guang Gong reposted

A new user on the Russian cybercrime forum Exploit just posted a video claiming to show a zero-day, remote code execution exploit in Google's latest Chrome browser running on Windows 10. Asking price: $2M. h/t @HoldSecurity


Guang Gong reposted

Double fetch vulnerabilities in C and C++ have been known for some time, but have varying types & causes, requiring different approaches for detection & mitigation This whitepaper (by @N1ckDunn) summarizes different manifestations & fixes of double fetch research.nccgroup.com/2022/03/28/whi…


Guang Gong reposted

Racing against the clock -- hitting a tiny kernel race window googleprojectzero.blogspot.com/2022/03/racing…


It's really a complicated bug, Google takes so long to fix it.

It's public now.



Guang Gong reposted

Security: JSON.stringify leaks TheHole value, leading to RCE crbug.com/1263462


Guang Gong reposted

Here are the slides from the "Attacking JavaScript Engines in 2022" talk by @itszn13 and myself @offensive_con. It's a high-level talk about JS, JIT, various bug classes, and typical exploitation flows but with lots of references for further digging! saelo.github.io/presentations/…


Guang Gong reposted

#hosselot_tips Q: How to develop a browser fuzzer? A: developing a browser fuzzer is tricky. Run and study publicly available browser fuzzers (domato, fuzzilli, ...) and try to modify/hack them until you get experienced. Here is a good example: blog.redteam.pl/2019/12/chrome…


Loading...

Something went wrong.


Something went wrong.