Ezrak1e

74 posts

Ezrak1e

Ezrak1e

@ezrak1e

Security researcher of Ant Security Light-Year Lab

Katılım Şubat 2019
197 Takip Edilen1.5K Takipçiler
Ezrak1e
Ezrak1e@ezrak1e·
3)CVE-2025-62221: Incorrect input in `cldflt!CldSyncDisconnectRoot` caused `CldSyncDisconnectRootByObject` to not execute but still return 0. This resulted in `RtlDeleteElementGenericTableAvl`. After `closehandle` was executed, this resulted in a dangling pointer to +0x60.
English
0
1
7
1.3K
Ezrak1e
Ezrak1e@ezrak1e·
Some LPE analysis in the December patch CVE-2025-62472&CVE-2025-59517&CVE-2025-62221 1)CVE-2025-62472:rasmans!QueueCloseConnections. Write an out-of-bounds conn pointer -> overwrite the user_data linked list -> unlink -> uaf(conn) -> uaf(port) -> lpe
Ezrak1e tweet mediaEzrak1e tweet mediaEzrak1e tweet media
English
4
19
124
10.1K
Ezrak1e
Ezrak1e@ezrak1e·
2)CVE-2025-59517:VspVsmbCommonRelativeCreate calls IoCreateFileEx with the IO_NO_PARAMETER_CHECKING (INPC) and IO_FORCE_ACCESS_CHECK (IFAC) options, but without the OBJ_FORCE_ACCESS_CHECK (OFAC) option,With the WS2IFSL driver, arbitrary address calls can be achieved->LPE
English
0
1
7
1.1K
Ezrak1e retweetledi
Danis Jiang
Danis Jiang@danis_jiang·
Our talk "Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years" has been accepted by BlackHat USA 2025! Super excited to present this work with @0x140ce and @ezrak1e. See you at #BHUSA! @BlackHatEvents #dark-corners-how-a-failed-patch-left-vmware-esxi-vm-escapes-open-for-two-years-45785" target="_blank" rel="nofollow noopener">blackhat.com/us-25/briefing…
Danis Jiang tweet media
English
3
14
99
8.5K
zh1x1an1221
zh1x1an1221@zh1x1an1221·
Under the guidance of several web3 friends, I tried to find some web3 bugs. Currently, 3 high and 2 medium in code4rena. Recently, I spent a day trying @PatrickAlphaC Codehawks and found the first one. Although it is low-risk, it is also very happy.
zh1x1an1221 tweet mediazh1x1an1221 tweet media
English
9
1
22
4.8K
k0shl
k0shl@KeyZ3r0·
Have similar experience in this situation. Tips: DON'T stop considering the possibility of one more vulnerability when you read an official document or vulnerability analysis.🤔
Ezrak1e@ezrak1e

A funny story about a vulnerability I found last year. It was fixed in February this year, probably CVE-2024-21371. The interesting point is that I discovered it and completed the exploit based on a piece of source code disclosed in the high-quality documentation report of msrc🤣

English
3
2
30
10K
Ezrak1e
Ezrak1e@ezrak1e·
However, due to the limitations of ZwOpenFile below, I did not complete the full exploit in the Chrome Sandbox. If you have the sechangenotifyprivilege permission, you can use \device\namedpipe\ to bypass it. hope someone can find a way to bypass it.
English
0
1
7
1.8K
Ezrak1e
Ezrak1e@ezrak1e·
The vulnerability is in IopXxxControlFile and can be triggered even in the chrome sandbox🤣
English
1
2
8
2.1K
Ezrak1e
Ezrak1e@ezrak1e·
A funny story about a vulnerability I found last year. It was fixed in February this year, probably CVE-2024-21371. The interesting point is that I discovered it and completed the exploit based on a piece of source code disclosed in the high-quality documentation report of msrc🤣
Ezrak1e tweet media
English
5
11
66
19.6K
Ezrak1e
Ezrak1e@ezrak1e·
Since RtlIsSandboxedToken, this vulnerability can only be triggered by a sandboxed process.
English
0
0
3
1.3K
Ezrak1e retweetledi
0x140ce
0x140ce@0x140ce·
Successfully bypassing the ArrayBuffer isolation in Adobe Reader and completing the fullchain with @ezrak1e, I will have the opportunity to share with how to perform heap layout under ArrayBuffer isolation and how my vul can reuse the ArrayBuffer as an arbitrary R/W primitive.
0x140ce tweet media
English
1
26
155
27.6K
Ezrak1e
Ezrak1e@ezrak1e·
Using a memory corruption vulnerability to achieve LPE on Windows11 Another Windows 11 kernel vulnerability was used for Adobe Sandbox Escape with @0x140ce to complete the Adobe Fullchian exploit Finally Escape from VMware ESXi’s vm with my teammates @0x140ce and @danis_jiang🫡
Ezrak1e tweet mediaEzrak1e tweet mediaEzrak1e tweet media
English
11
33
282
36.1K
Ezrak1e retweetledi
Danis Jiang
Danis Jiang@danis_jiang·
Escape from VMware ESXi’s vm with my teammates @0x140ce and @ezrak1e , such an unforgettable moment🎉🎉🎉
Danis Jiang tweet media
English
12
21
323
40.6K
Ezrak1e retweetledi
Nicolas Krassas
Nicolas Krassas@Dinosn·
A vulnerability in Windows’s File History Service allows local users to gain elevated privileges on the Windows operating system reddit.com/r/ReverseEngin…
English
1
73
223
25.4K
Ezrak1e retweetledi
k0shl
k0shl@KeyZ3r0·
I public my researching on CNG Key isolation with CVE-2023-28229 and CVE-2023-36906 on my blog, MSRC marked it as Exploitation less likely, but I complete the exploitation in a short time.😅😅 whereisk0shl.top/post/isolate-m…
English
2
71
176
47.3K