j00sean

2.5K posts

j00sean banner
j00sean

j00sean

@j00sean

Finding bugs everywhere

Santiago-Pontones, Spain Katılım Temmuz 2016
495 Takip Edilen3.2K Takipçiler
Sabitlenmiş Tweet
j00sean
j00sean@j00sean·
The largest update since long brought some interesting bugs which nobody talks about. Let me give few details about one: CVE-2025-21365. + Microsoft Office RCE vuln. + Word, PowerPoint and Outlook. + Logic bug. + Built-in process cont. + Built-in PV bypass. All in one. 😋😆🙃
English
7
32
91
9.1K
j00sean retweetledi
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
I found 2 UAF bugs in libxslt with Jackalope, let's find more together! The harness is now included in examples (link below). This also serves as a demo for two not very commonly used modes in Jackalope: grammar mutational fuzzing and sanitizer coverage. github.com/googleprojectz…
English
0
33
150
14.8K
j00sean retweetledi
h0mbre
h0mbre@h0mbre_·
VR is like being a detective but you have to find the crime scene
English
2
10
71
4.2K
j00sean retweetledi
stypr
stypr@brokenpacifist·
We at @dfsec_com are looking for a web security researcher with a strong research background in ruby or perl based services. Feel free to DM me for more info :)
English
0
12
79
10.3K
j00sean retweetledi
watchTowr
watchTowr@watchtowrcyber·
Welcome to @chudyPB in his debut watchTowr Labs post since joining the phorce in January (of many to come..)! In today's post, we dive into Kentico's Xperience CMS - highlighting multiple Authentication Bypass vulns chained with a post-auth RCE... labs.watchtowr.com/bypassing-auth…
English
2
47
159
34K
j00sean
j00sean@j00sean·
@ShravanMeghavat I can't give further details, but it's actually simpler. If you got it working like this, congrats ;)
English
1
0
0
120
R709
R709@ShravanMeghavat·
@j00sean I reproduced by placing malicious dll inside docx file and ziped. When I unzipped the dll is not extracted to temp directory there by not executing dll from temp folder. Is this right approach.
English
1
0
0
835
j00sean
j00sean@j00sean·
The largest update since long brought some interesting bugs which nobody talks about. Let me give few details about one: CVE-2025-21365. + Microsoft Office RCE vuln. + Word, PowerPoint and Outlook. + Logic bug. + Built-in process cont. + Built-in PV bypass. All in one. 😋😆🙃
English
7
32
91
9.1K
j00sean retweetledi
PT SWARM
PT SWARM@ptswarm·
🔥 The "impossible" XXE in PHP? Not so impossible anymore. Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it. Read: swarm.ptsecurity.com/impossible-xxe…
PT SWARM tweet media
English
0
112
325
24.1K
j00sean retweetledi
Haifei Li
Haifei Li@HaifeiLi·
Today, Microsoft has patched five additional Office bugs I discovered and reported recently, following the two Office bugs patched last month. msrc.microsoft.com/update-guide/v… msrc.microsoft.com/update-guide/v… msrc.microsoft.com/update-guide/v… msrc.microsoft.com/update-guide/v… msrc.microsoft.com/update-guide/v… Four out of the five are bugs discovered through a novel attack vector in Microsoft Office. Besides the bugs themselves, this attack vector could potentially aid real-world exploitation of Office bugs. As I have repeatedly emphasized, the importance of discovering novel attack vectors cannot be overstated (personally, I’d prefer to call myself an attack vector explorer rather than just a bug hunter). Hopefully I will get time to talk about the details sometime soon! If you're a defender or just a regular Office user, I recommend using the 64-bit version of Office instead of the 32-bit one, as the 64-bit version makes real-world exploitation much difficult. Timely patching, of course, is also important. P.S.: If you’d like to "fund" such novel attack vector research in complex software, I’m #opentowork. :) #office #patchtuesday
English
5
19
125
18.2K
j00sean retweetledi
MrAle98
MrAle98@MrAle_98·
Hey there, Finally published the article on the exploit for CVE-2025-21333-POC exploit. Here the link to the article: @ale18109800/cve-2025-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae" target="_blank" rel="nofollow noopener">medium.com/@ale18109800/c…
English
1
148
483
41.8K
j00sean
j00sean@j00sean·
@HaifeiLi @EXPMON_ Ykr. "Pro Tip: When investigating fuzz results know not all crashes are exploitable. Some apps intentionally crash when a bad input is detected." - Jan 10, 2017. "They (Microsoft Office) intentionally crash." - Mar 15, 2022. 😉😅🤷🤦
English
1
1
3
1.1K
Haifei Li
Haifei Li@HaifeiLi·
If you need a real-world Office sample triggering that weird 0xc0000409 crash, my @EXPMON_ system just detected one online: pub.expmon.com/analysis/24784… When an Office app tell you "stack buffer overrun", even with "FAST_FAIL_LEGACY_GS_VIOLATION", it doesn't really mean that, it's still non-exploitable. Sure I'd love if Microsoft's Office team change that one day, but now I just don't want to be played anymore.:)
Haifei Li tweet media
English
3
14
54
8.4K
j00sean retweetledi
Greg Linares (Laughing Mantis)
Greg Linares (Laughing Mantis)@Laughing_Mantis·
I ran probably the largest office fuzzing program in the world at one point We had 128 IBM blade systems fuzzing concurrently + office UI analysis @ 25k fuzzing attempts a minute, with crash analysis + crash confirmation + rewind + automated variation + user interaction simulation and code coverage analysis on code I wrote in .NET. we actually used rabbitmq to handle the queue system as well. We found so many crashes that we hired a 3rd party company to analyze. After the crashes continued we straight bought the 3rd party company because it was cheaper than hiring them long term. It was a wild time. Warms my heart to know you're doing cool stuff still with office
English
3
6
39
4K
j00sean retweetledi
b1ack0wl
b1ack0wl@b1ack0wl·
I fell into this trap very early into my career. I was told by more experienced ppl that browsers and mobile targets were always too difficult for me. However, after doing mobile research for the past few years I'm starting to see that I limited my own growth cause of others 🤡
Тsфdiиg@tsoding

Always keep in mind that majority of people consider something difficult because they were simply told so. "Difficult" shit is done by arrogant mfs who listen to nobody.

English
1
9
87
8.2K
j00sean retweetledi
Ryan M
Ryan M@Grimdoomer·
Here it is, introducing the Xbox 360 Bad Update exploit, a software only hypervisor exploit for dashboard version 17559: github.com/grimdoomer/Xbo…
English
54
391
2.8K
162.7K