CVE-2022-22265 Samsung npu driver #SamsungCVE2022-22265 #KernelExploit #CrossCacheOperations #PageTableSpray #KernelSearch https://soez.github.io/posts/CVE-2022-22265-Samsung-npu-driver/
CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6 #CVE202438063 #KernelExploit #IPv6 #VulnerabilityResearch #ASLRBypass https://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html
Malwaretech
CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6
Performing a root cause analysis & building proof-of-concept for CVE-2024-38063, a CVSS 9.8 Vulnerability In the Windows Kernel IPv6 Parser
[Cracking Windows Kernel with HEVD] Chapter 4: How do we write a shellcode to elevate privileges and gracefully return to userland? #PrivilegeElevation #KernelExploit #WindowsSecurity #AssemblyProgramming #Shellcode https://mdanilor.github.io/posts/hevd-4/
mdanilor.github.io
[Cracking Windows Kernel with HEVD] Chapter 4: How do we write a shellcode to elevate privileges and gracefully return to userland?
A beginers guide into a Windows kernel stack overflow vulnerability.
👍1
Fooling the Sandbox: A Chrome-atic Escape #ChromeSandboxEscape #CVE202430088 #KernelExploit #PrivilegeEscalation #IntegrityBypass https://starlabs.sg/blog/2025/07-fooling-the-sandbox-a-chrome-atic-escape/
STAR Labs
Fooling the Sandbox: A Chrome-atic Escape
For my internship, I was tasked by my mentor Le Qi to analyze CVE-2024-30088, a double-fetch race condition bug in the Windows Kernel Image ntoskrnl.exe. A public POC demonstrating EoP from Medium Integrity Level to SYSTEM is available on GitHub here.
Additionally…
Additionally…
From Chrome renderer code exec to kernel with MSG_OOB #ProjectZero #KernelExploit #UAF #MSG_OOB #ChromeSandbox https://googleprojectzero.blogspot.com/2025/08/from-chrome-renderer-code-exec-to-kernel.html
projectzero.google
From Chrome renderer code exec to kernel with MSG_OOB - Project Zero
IntroductionIn early June, I was reviewing a new Linux kernel feature when I learned about the MSG_OOB feature supported by stream-oriented UNIX domain socke...