mj0011 (@mj0011sec) 's Twitter Profile
mj0011

@mj0011sec

CEO of Cyber-Kunlun & Kunlun Lab. Former CTO of Qihoo 360, Founder of team 360Vulcan.

ID: 227622869

linkhttps://cyberkl.com calendar_today17-12-2010 09:59:10

422 Tweet

13,13K Takipçi

135 Takip Edilen

mj0011 (@mj0011sec) 's Twitter Profile Photo

This patch Tuesday fixed 5 vulnerabilities discovered by KunlunLab. 2 of them were for TianfuCup pdf reader sandbox escape & Win10 LPE, 1 CLFS bug was caught as in the wild exploit.

mj0011 (@mj0011sec) 's Twitter Profile Photo

CISA adds 15 vulns to the exploited list but at least 1 is wrong : CVE-2017-0101 is a null ptr deref in ntkrnl/tm, not exploitable for x64. The linked exp mislead them. It exploited a win32k bug (maybe 0102 or silence fixed one). Vulnerability Intel is hard.

mj0011 (@mj0011sec) 's Twitter Profile Photo

A lot of (36 in total) CVEs(5 critical) from Kunlun Lab fixed this month, mostly in DNS Server, SMB, LDAP, RPC runtime, Hyper-v...

mj0011 (@mj0011sec) 's Twitter Profile Photo

Kunlun lab reported 30 of the total 74 fixed vulnerabilities this month, with 3 different CVSS 9.8 rated ones related to LDAP & NFS.

mj0011 (@mj0011sec) 's Twitter Profile Photo

Repro of recently patched in the wild Chrome 0day CVE-2023-2033 by Kunlun Lab: mp.weixin.qq.com/s/2yy3ViqcBEbH… (CN) , more details available via CyberKunlun Intelligence Service

POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[POC2023] - SPEAKER UPDATE1⃣4️⃣ 💁‍♂️ Yuki Chen, k0shl, Azure Yang - Bug Hunting and Exploiting in Microsoft's Message Queuing (MSMQ) Components #POC2023

[POC2023] - SPEAKER UPDATE1⃣4️⃣

💁‍♂️ <a href="/guhe120/">Yuki Chen</a>, <a href="/KeyZ3r0/">k0shl</a>, Azure Yang - Bug Hunting and Exploiting in Microsoft's Message Queuing (MSMQ) Components

#POC2023
POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[POC2023] Keynote on vulnerability insights mj0011 giving his talk on “Navigating the light and darkness in the world of vulnerabilities” #POC2023

[POC2023] Keynote on vulnerability insights

<a href="/mj0011sec/">mj0011</a> giving his talk on “Navigating the light and darkness in the world of vulnerabilities”

#POC2023
POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[POC2023] D2 - Track B No MSMQ related talk was discussed before but now it is! Yuki Chen k0shl, Azure are talking about “Bug Hunting and Exploiting in Microsoft's Message Queuing(MSMQ) Components" #POC2023

[POC2023] D2 - Track B

No MSMQ related talk was discussed before but now it is!

<a href="/guhe120/">Yuki Chen</a> <a href="/KeyZ3r0/">k0shl</a>, Azure are talking about “Bug Hunting and Exploiting in Microsoft's Message Queuing(MSMQ) Components"

#POC2023
Rocco Calvi (@tecr0c) 's Twitter Profile Photo

Fascinating MSMQ talk by Yuki Chen, k0shl, & Azure on their msrc CVEs. Their exploitation is very clever bypassing all mitigations on latest Windows. Brilliant work! #POC2023

Fascinating MSMQ talk by <a href="/guhe120/">Yuki Chen</a>, <a href="/KeyZ3r0/">k0shl</a>, &amp; <a href="/4zure9/">Azure</a> on their msrc CVEs. Their exploitation is very clever bypassing all mitigations on latest Windows. Brilliant work! #POC2023
mj0011 (@mj0011sec) 's Twitter Profile Photo

This vulnerability is as critical as BlueKeep or EternalBlue. while Microsoft still ranked it as 'Exploitation less likely.' Urgent need for independent, closed-source vulnerability intelligence.

wei (@xiaowei___) 's Twitter Profile Photo

MSRC fixed a RCE bug in TCPIP module. I found the bug several months ago. Its score is 9.8 and exploitation is more likely. Please apply the patch immediately.

MSRC fixed a RCE bug in TCPIP module.
I found the bug several months ago.
Its score is 9.8 and exploitation is more likely. Please apply the patch immediately.
mj0011 (@mj0011sec) 's Twitter Profile Photo

0Click Windows Tcpip RCE found by Kunlun Lab. We offer intel services for proactive defense to critical vulnerabilities. Contact to learn more.

mj0011 (@mj0011sec) 's Twitter Profile Photo

Developed a simple tool for Black Myth: Wukong that enables 32:9 aspect ratio. available on GitHub if anyone's interested. github.com/3dnow/BlackMyt…

mj0011 (@mj0011sec) 's Twitter Profile Photo

A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering github.com/3dnow/NtCreate…