Lei Cao
@iamelli0t
Binary vulnerability εζ°΄ing && Threat hunting ζΈι±Όing
ID: 1118350906792144897
https://iamelli0t.github.io/ 17-04-2019 03:10:08
130 Tweet
2,2K Followers
191 Following
We're also publishing root cause analyses for the four 0-days: Chrome CVE-2021-21166: googleprojectzero.github.io/0days-in-the-wβ¦ Chrome CVE-2021-30551: googleprojectzero.github.io/0days-in-the-wβ¦ Internet Explorer CVE-2021-33742: googleprojectzero.github.io/0days-in-the-wβ¦ Safari CVE-2021-1879: googleprojectzero.github.io/0days-in-the-wβ¦
Not too difficult to repoduce the code excution part of CVE-2021-24090 in the latest Windows 10, thanks Gal De Leon for wonderful sharingπ
[Looking for iOS Speaker at #POC2021] If you think you are the one, DM or email us via pocadm dot gmail. Also, please welcome Lei Cao (Lei Cao) on board! He will be speaking about "Discovering Vulnerabilities by Studying 0-Day In the Wild" For more: powerofcommunity.net/speaker_main.hβ¦
Two in-the-wild 0-days patched by Chrome: CVE-2021-38000 and CVE-2021-38003. Both discovered by Google TAG! clem1 Neel Mehta Samuel GroΓ #itw0days chromereleases.googleblog.com/2021/10/stableβ¦
In the final part of his series covering a V8 bug used during #Pwn2Own, Hossein Lotfi details how the exploit took advantage of incorrect numeric results in JIT to get code execution on both #Chrome & #Edge. Read the details at zerodayinitiative.com/blog/2021/12/1β¦