
Man Yue Mo
@mmolgtm
Security researcher at GitHub Security Lab. Tweets/views/opinions are my own.
ID: 905804800750751745
07-09-2017 14:47:48
59 Tweet
4,4K Followers
78 Following

Learn how Man Yue Mo dug his way out of the Chrome sandbox using a credit card as a shovel! "The fugitive in Java: Escaping to Java to escape the Chrome sandbox" github.co/3AY6Uw6


Go dumpster diving for arbitrary code execution in v8's garbage collector with Man Yue Mo in his Chrome vulnerability RCA for CVE-2021-37975 github.co/3pjp3RY

In this post I'll go through 3 bugs in the Qualcomm NPU driver that I reported, which allowed me to execute arbitrary kernel code from the untrusted app domain in Android, disable SELinux and bypass task cred protection to gain root on a Samsung phone: securitylab.github.com/research/qualc…


In this post Man Yue Mo goes through the details of CVE-2022-1134, a type confusion in Chrome, and shows how to gain remote code execution in the Chrome renderer using this bug. github.co/3Oys62x




This time I'll look at CVE-2022-46395, an Arm Mali GPU driver UAF I found by analysing Jann Horn's CVE-2022-36449. I'll also use a technique of Jann Horn to win a very tight race to gain arbitrary kernel code execution and root from untrusted Android app. github.blog/2023-05-25-roo…





