Jiantao Li

384 posts

Jiantao Li

Jiantao Li

@CurseRed

Security Researcher @starlabs_sg , playing CTF with @r3kapig

Katılım Şubat 2010
400 Takip Edilen2.2K Takipçiler
Jiantao Li retweetledi
starlabs
starlabs@starlabs_sg·
Ever wondered what happens when you pickle a mailbox? 🥒📬 (No, it’s not a recipe, it’s a vulnerability.) Our team breaks down CVE-2025-20393 in a new deep dive post covering root cause, internals & exploitation details starlabs.sg/blog/2026/01-p… Written by @CurseRed & @bestswngs
English
1
27
86
7.9K
Jiantao Li retweetledi
starlabs
starlabs@starlabs_sg·
🖨️ Brother, can you spare us a root shell? We were ready for Pwn2Own but they patched it on the LAST DAY of registration 😭 Hope you enjoy this new blog post from us. 📖 starlabs.sg/blog/2025/11-b…
English
2
46
162
30.4K
Jiantao Li retweetledi
TrendAI Zero Day Initiative
📢 Confirmed! dmdung (@_piers2) used a single OOB access bug to exploit the @Sonos Era 300 smart speaker. In doing so, he earns $50,000 and 5 Master of Pwn points. #Pwn2Own
TrendAI Zero Day Initiative tweet media
English
1
11
98
18.6K
Jiantao Li retweetledi
starlabs
starlabs@starlabs_sg·
Recently our co-worker, @CurseRed found and reported some bugs in OnlyOffice while on a pentest engagement. We are always preparing organisations to protect against the ever-evolving threat of cyber attacks.
starlabs tweet media
English
0
6
60
12.1K
Jiantao Li retweetledi
starlabs
starlabs@starlabs_sg·
Lost in Translation: Apache Vulnerabilities That Don’t Count (Literally) Found a few bugs in Apache projects in 2024 - SSRF in Pony Mail Foal & RCE on whimsy\.apache\.org Fixed but no CVEs Sharing is Caring: starlabs.sg/blog/2025/09-l… Found by @CurseRed & former intern Devesh.
English
1
15
48
8.7K
Jiantao Li retweetledi
chiefpie
chiefpie@cplearns2h4ck·
Some of my bugs are patched in this month's patch tuesday, including the ones I used for Pwn2Own Berlin 2025. CVE-2025-50167 Race UAF in Hyper-V
chiefpie tweet media
English
9
37
382
24K
Jiantao Li retweetledi
shubs
shubs@infosec_au·
I hope everyone got some rest after @DownUnderCTF this weekend. My colleague @hash_kitten wrote up a blog post on a novel technique for SQL Injection in PDO's prepared statements, required to exploit the “legendary” challenge, which only got one solve: slcyber.io/assetnote-secu…
English
0
49
235
10.5K
Jiantao Li retweetledi
starlabs
starlabs@starlabs_sg·
CASE CLOSED: CVE-2025-29824 0 public samples, 0 information Suspect: Windows CLFS driver Crime: UAF leading to Privilege Escalation Status: ACTIVELY EXPLOITED ITW Investigation: Debugged and documented Case files: starlabs.sg/blog/2025/07-m… Done by our intern, Ong How Chong
English
0
40
159
19.2K
Jiantao Li retweetledi
r3kapig
r3kapig@r3kapig·
🎉 Last weekend we participated in bi0sCTF 2025 as r3kapig and secured first place! 🥇 Huge thanks to @teambi0s for organizing such an amazing competition! 🙏 Congratulations to @ProjectSEKAIctf for second place 🥈 and @thehackerscrew1 for third place 🥉
r3kapig tweet media
English
0
6
66
4K
Jiantao Li retweetledi
starlabs
starlabs@starlabs_sg·
When life gives you tangerines🍊 Intern Lin Ze Wei's task: Port a 2-bug exploit to Pixel 6 Pro Problem: One bug "doesn't work" Solution: Make it work with 1 bug Sometimes the best research comes from working with what you think you have starlabs.sg/blog/2025/06-s…
English
0
38
141
15.2K
Jiantao Li retweetledi
starlabs
starlabs@starlabs_sg·
"Why is my exploit taking 10 minutes?" *checks logs* *sees 10,000 kernel warnings* "...oh" 💡 Fresh Friday night read: our intern, Tan Ze Jian, on Mali exploitation - sometimes the fix is simpler than you think! starlabs.sg/blog/2025/05-g…
English
0
27
113
6.9K
Jiantao Li retweetledi
TrendAI Zero Day Initiative
Confirmed!! Dung and Nguyen (@MochiNishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. #Pwn2Own
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
3
14
106
9.8K
Jiantao Li retweetledi
TrendAI Zero Day Initiative
Nicely done! Billy (@st424204) and Ramdhan (@n0psledbyte) of STAR Labs used a UAF to perform their Docker Desktop escape and execute code on the underlying OS. They earn $60,000 and 6 Master of Pwn Points.
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
0
18
96
8.7K