
Jack Ren
@bjrjk
Followers
538
Following
457
Media
1
Statuses
45
Pursuit for a broad horizon. | Opinions are my own.
Joined April 2013
RT @mistymntncop: Exploit and mini writeup for CVE-2025-5419.
github.com
Contribute to mistymntncop/CVE-2025-5419 development by creating an account on GitHub.
0
61
0
RT @darkfloyd1014: This time is a real thrilling announcement as our paper about template-based fuzzing for JavaScript engine is accepted i….
0
9
0
Thanks to the reminder of @mistymntncop , I'm able to find an official writeup of Kaspersky and construct AddressOf / FakeObject primitives using their directives. The repository has been updated to include the codes and analysis.
0
0
7
Escalation methodology for CVE-2024-4947, a in-the-wild V8 type confusion bug. Shoutout to @vaber_b, @oct0xor, @buptsb, @mistymntncop, 303f06e3 and @DimitriFourny for their great research for this bug!
github.com
A in-the-wild V8 type confusion bug. Contribute to bjrjk/CVE-2024-4947 development by creating an account on GitHub.
3
38
150
RT @mistymntncop: My writeup for CVE-2024-7971. Just a POC. Let me know if u have any questions.
github.com
Contribute to mistymntncop/CVE-2024-7971 development by creating an account on GitHub.
0
65
0
Analysis and Exploit for CVE-2024-8381, a SpiderMonkey Interpreter Type Confusion Bug! Unfortunately, due to nature of this bug, exploit is only applicable when ASLR is disabled. Shoutout to @__nils_ for finding this bug.
github.com
CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug. - bjrjk/CVE-2024-8381
3
39
172
Released a slides for CVE-2022-4262!
github.com
Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8. - bjrjk/CVE-2022-4262
2
22
43
RT @mistymntncop: In light of the issue page for CVE-2024-5274 being made public. Me and @buptsb have decided to make our exploit public. I….
github.com
Contribute to mistymntncop/CVE-2024-5274 development by creating an account on GitHub.
0
49
0
The analysis slides has been published for CVE-2024-29943! Please refer to .
github.com
A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE - bjrjk/CVE-2024-29943
Exploit for Pwn2Own CVE-2024-29943, an Integer Range Inconsistency caused OOB access! Analysis will be updated later. Shoutout to.@_manfp for finding this bug. And shoutout to @maxpl0it for his integer range inconsistent PoC.
0
17
103
Full chain analysis for CVE-2022-4262 to commemorate my time spent on this non-trivial type confusion! Shoutout to @mistymntncop for his crafted artful exploit and discussion with me! And shoutout to @_clem1, @5aelo, @alisaesage for their prior work :).
github.com
Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8. - bjrjk/CVE-2022-4262
5
53
165
RT @mistymntncop: Exploit for CVE-2022-4262. Fukin finally! Shoutout to @_clem1 for finding the ITW exploit. And shoutout to @5aelo, @bjrjk….
github.com
Contribute to mistymntncop/CVE-2022-4262 development by creating an account on GitHub.
0
58
0