
ShaiHasarfaty
111 posts

ShaiHasarfaty
@hasarfaty
Sr. Principal Security Architect & Offensive Security Researcher @Intel | Opinions are my own and not the views of my employer!





How to Find a Buffer Overflow Bug Bounty in Google Chrome 2024-: grep memcpy issues.chromium.org/issues/3334143… 2025+: grep memcpy, also vibe fuzzing issues.chromium.org/issues/4096192…



0-Click RCE in MediaTek Wi-Fi Chipsets — 4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways blog.coffinsec.com/0day/2024/08/3…

Reference code bugs are always tricky. Both #PixieFAIL and #LogoFAIL remain unfixed on many enterprise devices at scale. PixieFAIL is related to the EDK2, and fixing this one requires IBV or OEM to update their code first. Such bugs show how the entire FW ecosystem is broken.












Vulnerability Sessions: Learn more about CVE-2021-31199, a vulnerability found in multiple versions of Windows 10 used to break out of the Adobe sandbox. READ MORE: blog.exodusintel.com/2023/04/06/esc… #cybersecuritytraining #vulnerabilityintelligence #Cybercrime








Awesome video from @FlashbackPwn team about their security research and exploitation. This is part 1: DNS Remote Code Execution - Finding the Vulnerability youtube.com/watch?v=xWoQ-E…




