Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

[@xvonfers](/creator/twitter/xvonfers)
"Exploited ITW(chained with CVE-2025-5419) (CVE-2025-6558)427162086similar to 402078335Incorrect validation of untrusted input - sbx escape(via libGLES_mali.so) is now open with PoC Reported by Clment Lecigne(@_clem1) and Vlad Stolyarov(@vladhiewsha)"  
[X Link](https://x.com/xvonfers/status/1979594610226643021) [@xvonfers](/creator/x/xvonfers) 2025-10-18T17:05Z 4593 followers, 12.4K engagements


"(CVE-2025-8010)$8000430344952compilerpreparserType Confusion is now open with PoC Reported by Shaheen Fazim(@shaheenfazim)"  
[X Link](https://x.com/xvonfers/status/1979596371390030235) [@xvonfers](/creator/x/xvonfers) 2025-10-18T17:12Z 4593 followers, 4889 engagements


"(CVE-2025-8292)$8000426054987UAF in MediaStreamTrackImpl is now open with PoC Reported by dnpushme & Zhiniang Peng with HUST"  
[X Link](https://x.com/xvonfers/status/1980687571110994022) [@xvonfers](/creator/x/xvonfers) 2025-10-21T17:28Z 4593 followers, 2116 engagements


"(CVE-2025-11709)1989127canvasA compromised web process was able to trigger OOBRW in a more privileged process using manipulated WebGL textures Reported by Oskar L"  
[X Link](https://x.com/xvonfers/status/1978608649556611419) [@xvonfers](/creator/x/xvonfers) 2025-10-15T23:47Z 4591 followers, 1478 engagements


"(CVE-2025-11711)1989978vmThere was a way to change the value of JS Object properties that were supposed to be non-writeable(unwritable iterator indices) Reported by EntryHi"  
[X Link](https://x.com/xvonfers/status/1978609838302126215) [@xvonfers](/creator/x/xvonfers) 2025-10-15T23:52Z 4591 followers, 2068 engagements


"428177287block MSG_OOB in renderer sandbox Jann Horn(@tehjh)"  
[X Link](https://x.com/xvonfers/status/1979595635692327047) [@xvonfers](/creator/x/xvonfers) 2025-10-18T17:09Z 4591 followers, XXX engagements


"450618029interpreter Merge hole elision info on continue for loops that are structured"  
[X Link](https://x.com/xvonfers/status/1980689194709315949) [@xvonfers](/creator/x/xvonfers) 2025-10-21T17:34Z 4593 followers, XXX engagements


"(CVE-2025-12036)452296415jsonParserExpect()/ExpectNext() used to simply set the cursor to the end of the input if the failed expectation can trigger a GC due to allocation of the Exception object Reported by Google Big Sleep"  
[X Link](https://x.com/xvonfers/status/1981058161252716897) [@xvonfers](/creator/x/xvonfers) 2025-10-22T18:00Z 4593 followers, 1286 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@xvonfers "Exploited ITW(chained with CVE-2025-5419) (CVE-2025-6558)427162086similar to 402078335Incorrect validation of untrusted input - sbx escape(via libGLES_mali.so) is now open with PoC Reported by Clment Lecigne(@_clem1) and Vlad Stolyarov(@vladhiewsha)"
X Link @xvonfers 2025-10-18T17:05Z 4593 followers, 12.4K engagements

"(CVE-2025-8010)$8000430344952compilerpreparserType Confusion is now open with PoC Reported by Shaheen Fazim(@shaheenfazim)"
X Link @xvonfers 2025-10-18T17:12Z 4593 followers, 4889 engagements

"(CVE-2025-8292)$8000426054987UAF in MediaStreamTrackImpl is now open with PoC Reported by dnpushme & Zhiniang Peng with HUST"
X Link @xvonfers 2025-10-21T17:28Z 4593 followers, 2116 engagements

"(CVE-2025-11709)1989127canvasA compromised web process was able to trigger OOBRW in a more privileged process using manipulated WebGL textures Reported by Oskar L"
X Link @xvonfers 2025-10-15T23:47Z 4591 followers, 1478 engagements

"(CVE-2025-11711)1989978vmThere was a way to change the value of JS Object properties that were supposed to be non-writeable(unwritable iterator indices) Reported by EntryHi"
X Link @xvonfers 2025-10-15T23:52Z 4591 followers, 2068 engagements

"428177287block MSG_OOB in renderer sandbox Jann Horn(@tehjh)"
X Link @xvonfers 2025-10-18T17:09Z 4591 followers, XXX engagements

"450618029interpreter Merge hole elision info on continue for loops that are structured"
X Link @xvonfers 2025-10-21T17:34Z 4593 followers, XXX engagements

"(CVE-2025-12036)452296415jsonParserExpect()/ExpectNext() used to simply set the cursor to the end of the input if the failed expectation can trigger a GC due to allocation of the Exception object Reported by Google Big Sleep"
X Link @xvonfers 2025-10-22T18:00Z 4593 followers, 1286 engagements

creator/twitter::1695083774881550336/posts
/creator/twitter::1695083774881550336/posts