gylxor

@gylxor

Security Researcher

Seoul, South Korea
Vrijeme pridruživanja: prosinac 2019.

Tweetovi

Blokirali ste korisnika/cu @gylxor

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gylxor

  1. proslijedio/la je Tweet
    16. pro 2019.

    Can also be used as a straight sbx escape given a Spidermonkey bug: just set a malicious WPAD script via preferences, it will be executed in the UI process.

    Poništi
  2. proslijedio/la je Tweet

    Start off the week with the 2nd part of 's look into reversing a TP-Link TL-WR841N wireless router. His write-up includes a full exploit & a video demonstration of ZDI-19-992.

    Poništi
  3. proslijedio/la je Tweet

    SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4

    Poništi
  4. proslijedio/la je Tweet

    Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug.

    Poništi
  5. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  6. proslijedio/la je Tweet

    macOS: Kernel use-after-free due to race condition in wait_for_namespace_event()

    Poništi
  7. proslijedio/la je Tweet
    17. pro 2019.

    Simplest and strangest sandbox escape I've found in Chrome was just derestricted

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·