cyx (@cyx0d) 's Twitter Profile
cyx

@cyx0d

life is too short to hide your zero-days

ID: 1169584257481789441

calendar_today05-09-2019 12:14:50

276 Tweet

291 Followers

1,1K Following

xvonfers (@xvonfers) 's Twitter Profile Photo

Exploited ITW (CVE-2025-5419)[420636529][turbofan]OOBRW chromium-review.googlesource.com/c/v8/v8/+/6594… chromereleases.googleblog.com/2025/06/stable… Reported by Clément Lecigne(clem1) and Benoît Sevens

Trenchant (@trenchantarc) 's Twitter Profile Photo

Remember that great OffensiveCon talk? Or sad you missed it? Well, here are the slides for it! github.com/TrenchantARC/G…

xvonfers (@xvonfers) 's Twitter Profile Photo

[425896305][objects, heap] A lot of code in the GC uses unsigned sizes to copy around bytes or iterate objects. The size of on-heap objects is stored as int. Attackers can craft negative sizes that can lead to very large offsets via sign extension and e.g. conversion to size_t.

Hossein Lotfi (@hosselot) 's Twitter Profile Photo

The fix for Google Chrome V8 In-The-Wild Type Confusion vulnerability in interpreter bytecode generator (CVE-2025-6554 [427663123]): chromium.googlesource.com/v8/v8.git/+/22… Further hardening: chromium.googlesource.com/v8/v8.git/+/2c…

Security Bug Aggregator (@bugsaggregator) 's Twitter Profile Photo

V8 Sandbox Bypass: Uninitialized read to switch-case OOB jump in Maglev JSGeneratorObject allocation inlining (reward: $25000) crbug.com/403600260

Security Bug Aggregator (@bugsaggregator) 's Twitter Profile Photo

[In-the-wild][427162086] High CVE-2025-6558: Incorrect validation of untrusted input in ANGLE and GPU. Reported by Clément Lecigne and Vlad Stolyarov of Google's Threat Analysis Group on 2025-06-23 Google is aware that an exploit for CVE-2025-6558 exists in the wild.

Jack Ren (@bjrjk) 's Twitter Profile Photo

Escalation methodology for CVE-2024-4947, a in-the-wild V8 type confusion bug. Shoutout to vaber, Boris Larin, 1377 High-yield Nukes, j j, 303f06e3 and Dimitri Fourny for their great research for this bug! github.com/bjrjk/CVE-2024…

xvonfers (@xvonfers) 's Twitter Profile Photo

rust😁 (CVE-2025-48530)[crabbyavif, Avif parser/decoder][NV12]OOB accesses(YUV planes, alpha plane, Y plane, UV planes, chroma width calc, plane size calc, row bytes,...) -> 0-click RCE android.googlesource.com/platform/exter… alloc -> decoder write -> copy/access -> RCE potential

1377 High-yield Nukes (@buptsb) 's Twitter Profile Photo

You are one of the TC39 committee member and JavaScript language expert, generate 1 million js samples based on tc39/proposal-explicit-resource-management until a DCHECK happens since we are P0 and have infinite token quota.

xvonfers (@xvonfers) 's Twitter Profile Photo

[$3000][415523530][maglev types]Debug check failed: CanElideWriteBarrier(object, value) chromium-review.googlesource.com/c/v8/v8/+/6532… Reported by Zhenghang Xiao (Kiprey) and Nan Wang (sakura)