Jack Ren Profile
Jack Ren

@bjrjk

Followers
538
Following
457
Media
1
Statuses
45

Pursuit for a broad horizon. | Opinions are my own.

Joined April 2013
Don't wanna be here? Send us removal request.
@bjrjk
Jack Ren
18 days
RT @darkfloyd1014: This time is a real thrilling announcement as our paper about template-based fuzzing for JavaScript engine is accepted i….
0
9
0
@grok
Grok
4 days
Join millions who have switched to Grok.
181
370
3K
@bjrjk
Jack Ren
23 days
Thanks to the reminder of @mistymntncop , I'm able to find an official writeup of Kaspersky and construct AddressOf / FakeObject primitives using their directives. The repository has been updated to include the codes and analysis.
0
0
7
@bjrjk
Jack Ren
1 month
Escalation methodology for CVE-2024-4947, a in-the-wild V8 type confusion bug. Shoutout to @vaber_b, @oct0xor, @buptsb, @mistymntncop, 303f06e3 and @DimitriFourny for their great research for this bug!
Tweet card summary image
github.com
A in-the-wild V8 type confusion bug. Contribute to bjrjk/CVE-2024-4947 development by creating an account on GitHub.
3
38
150
@bjrjk
Jack Ren
5 months
RT @mistymntncop: My writeup for CVE-2024-7971. Just a POC. Let me know if u have any questions.
Tweet card summary image
github.com
Contribute to mistymntncop/CVE-2024-7971 development by creating an account on GitHub.
0
65
0
@bjrjk
Jack Ren
7 months
Analysis and Exploit for CVE-2024-8381, a SpiderMonkey Interpreter Type Confusion Bug! Unfortunately, due to nature of this bug, exploit is only applicable when ASLR is disabled. Shoutout to @__nils_ for finding this bug.
Tweet card summary image
github.com
CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug. - bjrjk/CVE-2024-8381
3
39
172
@bjrjk
Jack Ren
1 year
RT @mistymntncop: In light of the issue page for CVE-2024-5274 being made public. Me and @buptsb have decided to make our exploit public. I….
Tweet card summary image
github.com
Contribute to mistymntncop/CVE-2024-5274 development by creating an account on GitHub.
0
49
0
@bjrjk
Jack Ren
1 year
The analysis slides has been published for CVE-2024-29943! Please refer to .
github.com
A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE - bjrjk/CVE-2024-29943
@bjrjk
Jack Ren
1 year
Exploit for Pwn2Own CVE-2024-29943, an Integer Range Inconsistency caused OOB access! Analysis will be updated later. Shoutout to.@_manfp for finding this bug. And shoutout to @maxpl0it for his integer range inconsistent PoC.
0
17
103
@bjrjk
Jack Ren
1 year
Exploit for Pwn2Own CVE-2024-29943, an Integer Range Inconsistency caused OOB access! Analysis will be updated later. Shoutout to.@_manfp for finding this bug. And shoutout to @maxpl0it for his integer range inconsistent PoC.
10
65
294
@bjrjk
Jack Ren
2 years
Full chain analysis for CVE-2022-4262 to commemorate my time spent on this non-trivial type confusion! Shoutout to @mistymntncop for his crafted artful exploit and discussion with me! And shoutout to @_clem1, @5aelo, @alisaesage for their prior work :).
Tweet card summary image
github.com
Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8. - bjrjk/CVE-2022-4262
5
53
165
@bjrjk
Jack Ren
2 years
RT @mistymntncop: Exploit for CVE-2022-4262. Fukin finally! Shoutout to @_clem1 for finding the ITW exploit. And shoutout to @5aelo, @bjrjk….
Tweet card summary image
github.com
Contribute to mistymntncop/CVE-2022-4262 development by creating an account on GitHub.
0
58
0