Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, is it secure enough?
As you might have guessed, the answer is not so much.
We chained six unique CVEs from 2023 listed below.
• Chrome Renderer RCE : CVE-2023-3079
• Chrome Sandbox Escape : CVE-2023-21674
• LPE in guest OS : CVE-2023-29360
• VMware Info Leak : CVE-2023-34044
• VMware Escape : CVE-2023-20869
• LPE in host OS : CVE-2023-36802
Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application.
ibm.com/think/x-force/operat…
Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandbox escape vulnerabilities in CoreAudio on MacOS.
I'll talk about this and the exploitation process next week @offensive_con!
googleprojectzero.blogspot.c…
We are back😎 Say hello to our kernelCTF submission for CVE-2025-37752🩸
Who would have thought you could pwn a kernel with just a 0x0000 written 262636 bytes out of bounds?
Read the full writeup at: syst3mfailure.io/two-bytes-o… 👀
I got back into bug hunting recently for the first time in a looooooong time. Bug 1 from week 1 was a pre-auth remote UAF in the Linux kernel's SMB implementation github.com/torvalds/linux/co…
The BSides Canberra 2024 keynote is now available to watch!
"The Exploit Development Life Cycle: From Concept to Compromise" – @chompie1337 breaks down the art of exploit dev, from that first spark to full pwnage.
Missed it live? Watch it now: piped.video/ce0bXORSMX4
Another month, another writing
RCE vulnerability inside Opera browser by using a stored self-XSS on MyFlow (this is different from the previous rce which I published back in 2021)
medium.com/@renwa/stored-xss…