<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>Tencent Xuanwu Lab</title>
  
  
  <link href="/en/atom.xml" rel="self"/>
  
  <link href="https://xlab.tencent.com/en/"/>
  <updated>2026-03-03T07:33:36.492Z</updated>
  <id>https://xlab.tencent.com/en/</id>
  
  <author>
    <name>xlab</name>
    
  </author>
  
  <generator uri="https://hexo.io/">Hexo</generator>
  
  <entry>
    <title>Ghost Dependencies: An Emerging Supply Chain Security Threat in the Agentic Coding Paradigm</title>
    <link href="https://xlab.tencent.com/en/2026/02/28/ghost-dependency-agentic-coding-supply-chain-threat/"/>
    <id>https://xlab.tencent.com/en/2026/02/28/ghost-dependency-agentic-coding-supply-chain-threat/</id>
    <published>2026-02-27T16:00:00.000Z</published>
    <updated>2026-03-03T07:33:36.492Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;strong&gt;Author: Tianchu Chen of Tencent Xuanwu Lab&lt;/strong&gt;&lt;/p&gt;
&lt;h1 id=&quot;0x00-Introduction&quot;&gt;&lt;a href=&quot;#0x00-Introduction&quot; class=&quot;headerlink&quot; title=&quot;0x00 Introduction&quot;&gt;&lt;/a&gt;0x00 Introduction&lt;/h1&gt;&lt;p&gt;As the capabilities of Large Language Models (LLMs) continue to advance, AI-assisted software development is evolving from the “Copilot” paradigm—where humans write code and AI provides completions—to the “Agentic Coding” paradigm, where AI autonomously makes decisions and executes actions. In this new paradigm, AI is no longer merely a code generation assistant but has transformed into an intelligent agent capable of independently planning tasks, selecting technology stacks, manipulating file systems, and even executing commands.&lt;/p&gt;
&lt;p&gt;However, this transfer of control introduces new attack surfaces: AI Agents make decisions on behalf of users, but these decisions are not always secure. Through extensive testing and analysis of mainstream Agentic Coding tools and their underlying LLMs, we have identified several prevalent AI decision-making risks. Among these, a category of risks related to the software supply chain can produce persistent and covert impacts. We have termed this phenomenon “Ghost Dependencies.”&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
      <category term="ai security" scheme="https://xlab.tencent.com/en/tags/ai-security/"/>
    
      <category term="agentic coding" scheme="https://xlab.tencent.com/en/tags/agentic-coding/"/>
    
      <category term="supply chain" scheme="https://xlab.tencent.com/en/tags/supply-chain/"/>
    
      <category term="atuin" scheme="https://xlab.tencent.com/en/tags/atuin/"/>
    
  </entry>
  
  <entry>
    <title>AI Web Crawler Security White Paper</title>
    <link href="https://xlab.tencent.com/en/2026/02/02/ai-browser-crawler-whitepaper/"/>
    <id>https://xlab.tencent.com/en/2026/02/02/ai-browser-crawler-whitepaper/</id>
    <published>2026-02-02T07:20:00.000Z</published>
    <updated>2026-02-28T12:17:58.731Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;strong&gt;Author:&lt;/strong&gt; Guancheng Li and Zheng Wang of Tencent Xuanwu Lab&lt;/p&gt;
&lt;p&gt;This white paper from Tencent Xuanwu Lab analyzes how moving browsers and crawlers from user endpoints into AI server-side infrastructure fundamentally changes the attack and defense landscape. As LLM-based agents increasingly rely on server-side browsing for search, data extraction, and automated task execution, the browser becomes a high-value, high-risk component embedded deep inside the data center.&lt;/p&gt;
&lt;p&gt;Building on real-world security testing against multiple large-scale AI products, the paper reconstructs typical attack chains against server-side browsers, explains why traditional “patch + sandbox” assumptions fail in this environment, and proposes a defense-in-depth framework centered on &lt;strong&gt;static attack surface reduction + dynamic runtime isolation&lt;/strong&gt;. It also introduces SEChrome, an open-sourced practical protection layer for securing server-side Chrome-based crawlers.&lt;/p&gt;
&lt;p&gt;Download: &lt;a href=&quot;/en/uploads/2026/ai_browser_crawler/AI%20Web%20Crawler%20Security%20White%20Paper.pdf&quot;&gt;AI Web Crawler Security White Paper.pdf&lt;/a&gt;&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
      <category term="ai security" scheme="https://xlab.tencent.com/en/tags/ai-security/"/>
    
      <category term="browser security" scheme="https://xlab.tencent.com/en/tags/browser-security/"/>
    
  </entry>
  
  <entry>
    <title>Arbitrary File Upload Leading to RCE in ComfyUI-Manager</title>
    <link href="https://xlab.tencent.com/en/2026/01/06/xlab-26-001/"/>
    <id>https://xlab.tencent.com/en/2026/01/06/xlab-26-001/</id>
    <published>2026-01-06T06:30:00.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;Tencent Xuanwu Lab has identified a high-severity vulnerability (CVE-2025-67303) in ComfyUI-Manager, the integrated extension component of the visual AI workflow tool ComfyUI. In out-of-the-box configurations, this flaw allows a remote attacker to compromise the system without any authentication. By bypassing security restrictions, an attacker can execute arbitrary code, leading to full server compromise.&lt;br&gt;The issue has been patched in the latest version of ComfyUI-Manager.&lt;/p&gt;
    
    </summary>
    
    
      <category term="advisories" scheme="https://xlab.tencent.com/en/category/advisories/"/>
    
    
  </entry>
  
  <entry>
    <title>How Far Are Quantum Computers from Breaking RSA-2048?</title>
    <link href="https://xlab.tencent.com/en/2025/11/21/how-far-are-quantum-computers-from-breaking-rsa-2048/"/>
    <id>https://xlab.tencent.com/en/2025/11/21/how-far-are-quantum-computers-from-breaking-rsa-2048/</id>
    <published>2025-11-20T16:00:00.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;strong&gt;Author: Guancheng Li of Tencent Xuanwu Lab&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In today’s digital world, classical public-key cryptography such as RSA-2048 and ECC are the most widely used encryption standards, supporting the underlying trust of network security, financial transactions, and privacy protection. However, this cornerstone is facing the potential threat of quantum computing. In theory, quantum computers can factorize large integers and solve discrete logarithms at speeds far exceeding classical computers, thereby breaking RSA and ECC encryption in a short time. This prospect is both exciting and worrying.&lt;/p&gt;
&lt;p&gt;The question is: what stage has the development of quantum computers reached? Some optimistically believe that the “countdown” to classical public-key cryptography has already begun; others doubt that truly usable quantum computers are still far away due to manufacturing difficulties. There are various opinions in the market, often optimistic or pessimistic, but the core question always lingers: how far are quantum computers from breaking classical public-key cryptography? We will attempt to answer this question by dismantling and analyzing the manufacturing bottlenecks and breakthrough hopes of quantum computers.&lt;/p&gt;
    
    </summary>
    
    
      <category term="PQC" scheme="https://xlab.tencent.com/en/category/PQC/"/>
    
    
      <category term="PQC" scheme="https://xlab.tencent.com/en/tags/PQC/"/>
    
  </entry>
  
  <entry>
    <title>A Mirage of Safety: Bug Finding and Exploit Techniques of Top Android Vendor&#39;s Privacy Protection Apps</title>
    <link href="https://xlab.tencent.com/en/2021/05/14/A-Mirage-of-Safety-Bug-Finding-and-Exploit-Techniques-of-Top-Android-Vendors-Privacy-Protection-Apps/"/>
    <id>https://xlab.tencent.com/en/2021/05/14/A-Mirage-of-Safety-Bug-Finding-and-Exploit-Techniques-of-Top-Android-Vendors-Privacy-Protection-Apps/</id>
    <published>2021-05-13T16:00:00.000Z</published>
    <updated>2026-02-28T12:17:58.731Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;em&gt;Author: Xiangqian Zhang, Huiming Liu of Tencent Security Xuanwu Lab&lt;/em&gt;&lt;/p&gt;
&lt;h1 id=&quot;0x0-Introduction&quot;&gt;&lt;a href=&quot;#0x0-Introduction&quot; class=&quot;headerlink&quot; title=&quot;0x0 Introduction&quot;&gt;&lt;/a&gt;0x0 Introduction&lt;/h1&gt;&lt;p&gt;In this blog, we will detail our research on Android privacy protection apps. We investigated the privacy protection applications provided by the top five Android vendors and found that many applications do not protect our privacy well. &lt;/p&gt;
&lt;p&gt;We proposed three threat models based on our research. And we will show four attack examples for the privacy protection applications.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
      <category term="Android" scheme="https://xlab.tencent.com/en/tags/Android/"/>
    
      <category term="privacy" scheme="https://xlab.tencent.com/en/tags/privacy/"/>
    
  </entry>
  
  <entry>
    <title>CVE-2020-9971 Abusing XPC Service mechanism to elevate privilege in macOS/iOS</title>
    <link href="https://xlab.tencent.com/en/2021/01/11/cve-2020-9971-abusing-xpc-service-to-elevate-privilege/"/>
    <id>https://xlab.tencent.com/en/2021/01/11/cve-2020-9971-abusing-xpc-service-to-elevate-privilege/</id>
    <published>2021-01-11T10:26:30.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;em&gt;Author: Zhipeng Huo(&lt;a href=&quot;https://twitter.com/R3dF09&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;@R3dF09&lt;/a&gt;) of Tencent Security Xuanwu Lab&lt;/em&gt;&lt;/p&gt;
&lt;h1 id=&quot;0x0-Introduction&quot;&gt;&lt;a href=&quot;#0x0-Introduction&quot; class=&quot;headerlink&quot; title=&quot;0x0 Introduction&quot;&gt;&lt;/a&gt;0x0 Introduction&lt;/h1&gt;&lt;p&gt;In this blog, I will detail an interesting logic vulnerability I found in &lt;code&gt;launchd&lt;/code&gt; process when it is managing the XPC Services. It’s easy be exploited and 100% stable to get high privilege in macOS/iOS. Because &lt;code&gt;launchd&lt;/code&gt; is the most fundamental and important component in the OS, the vulnerability would also work even from the most restricted app sandbox. The vulnerability should work before macOS Big Sur and iOS 13.5.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
      <category term="CVE-2020-9971" scheme="https://xlab.tencent.com/en/tags/CVE-2020-9971/"/>
    
      <category term="XPC Service" scheme="https://xlab.tencent.com/en/tags/XPC-Service/"/>
    
      <category term="LPE" scheme="https://xlab.tencent.com/en/tags/LPE/"/>
    
      <category term="macOS" scheme="https://xlab.tencent.com/en/tags/macOS/"/>
    
      <category term="iOS" scheme="https://xlab.tencent.com/en/tags/iOS/"/>
    
  </entry>
  
  <entry>
    <title>Deep Analysis of CVE-2019-8014: The Vulnerability Ignored 6 Years Ago</title>
    <link href="https://xlab.tencent.com/en/2019/09/12/deep-analysis-of-cve-2019-8014/"/>
    <id>https://xlab.tencent.com/en/2019/09/12/deep-analysis-of-cve-2019-8014/</id>
    <published>2019-09-12T06:14:22.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;em&gt;This post provides detailed analysis for CVE-2019-8014 which was fixed in Adobe Acrobat Reader / Pro DC recently. Interestingly, it’s a patch bypass of CVE-2013-2729 which was fixed six years ago. This post also discusses how to exploit the vulnerability.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Author: &lt;strong&gt;Ke Liu of Tencent Security Xuanwu Lab&lt;/strong&gt;&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
      <category term="Bitmap" scheme="https://xlab.tencent.com/en/tags/Bitmap/"/>
    
      <category term="CVE-2013-2729" scheme="https://xlab.tencent.com/en/tags/CVE-2013-2729/"/>
    
      <category term="CVE-2019-8014" scheme="https://xlab.tencent.com/en/tags/CVE-2019-8014/"/>
    
      <category term="RLE" scheme="https://xlab.tencent.com/en/tags/RLE/"/>
    
      <category term="XFA" scheme="https://xlab.tencent.com/en/tags/XFA/"/>
    
  </entry>
  
  <entry>
    <title>Ghidra From XXE to RCE</title>
    <link href="https://xlab.tencent.com/en/2019/03/18/ghidra-from-xxe-to-rce/"/>
    <id>https://xlab.tencent.com/en/2019/03/18/ghidra-from-xxe-to-rce/</id>
    <published>2019-03-18T10:21:19.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;Authors: tomato, salt of Tencent Security Xuanwu Lab&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
  </entry>
  
  <entry>
    <title>Investigating WinRAR Code Execution Vulnerability (CVE-2018-20250) at Internet Scale</title>
    <link href="https://xlab.tencent.com/en/2019/02/22/investigating-winrar-code-execution-vulnerability-cve-2018-20250-at-internet-scale/"/>
    <id>https://xlab.tencent.com/en/2019/02/22/investigating-winrar-code-execution-vulnerability-cve-2018-20250-at-internet-scale/</id>
    <published>2019-02-22T12:15:35.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;Authors: lywang, dannywei&lt;/p&gt;
&lt;h1 id=&quot;0x00-Background&quot;&gt;&lt;a href=&quot;#0x00-Background&quot; class=&quot;headerlink&quot; title=&quot;0x00 Background&quot;&gt;&lt;/a&gt;0x00 Background&lt;/h1&gt;&lt;p&gt;As one of the most popular archiving software, WinRAR supports compress and decompress of multiple file archive formats. Check Point security researcher Nadav Grossman recently discovered a series of security vulnerabilities he found in WinRAR, with most powerful one being a remote code execution vulnerability in ACE archive decompression module (CVE-2018-20250).&lt;br&gt;To support decompression of ACE archives, WinRAR integrated a 19-year-old dynamic link library unacev2.dll, which never updated since 2006, nor does it enable any kind of exploit mitigation technologies. Nadav Grossman uncovered a dictionary traversal bug in unacev2.dll, which could allow an attacker to execute arbitrary code or leak Net-NTLM hashes.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
  </entry>
  
  <entry>
    <title>Spoof All Domains Containing &#39;d&#39; in Apple Products [CVE-2018-4277]</title>
    <link href="https://xlab.tencent.com/en/2018/11/13/cve-2018-4277/"/>
    <id>https://xlab.tencent.com/en/2018/11/13/cve-2018-4277/</id>
    <published>2018-11-13T07:53:50.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;During this time I have been researching security issues on the browser front end, and I have found dozens of vulnerabilities in browsers such as Chrome, Safari, and Firefox. Unicode visual  security and IDN homograph attack have also been the subject of my research.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
      <category term="Unicode" scheme="https://xlab.tencent.com/en/tags/Unicode/"/>
    
  </entry>
  
  <entry>
    <title>Pay attention to the Ethereum hash collision problem from the &quot;Stealing coins&quot; incident</title>
    <link href="https://xlab.tencent.com/en/2018/11/09/pay-attention-to-the-ethereum-hash-collision-problem-from-the-stealing-coins-incident/"/>
    <id>https://xlab.tencent.com/en/2018/11/09/pay-attention-to-the-ethereum-hash-collision-problem-from-the-stealing-coins-incident/</id>
    <published>2018-11-09T04:15:37.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;strong&gt;Author : Kai Song(exp-sky) , hearmen , salt , sekaiwu of Tencent Security Xuanwu Lab&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&quot;“Stealing-coins”&quot;&gt;&lt;a href=&quot;#“Stealing-coins”&quot; class=&quot;headerlink&quot; title=&quot;“Stealing coins”&quot;&gt;&lt;/a&gt;“Stealing coins”&lt;/h2&gt;&lt;p&gt;On November 6th, we observed that such a &lt;a href=&quot;https://etherscan.io/address/0x5170a14aa36245a8a9698f23444045bdc4522e0a#code&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;contract&lt;/a&gt; appeared on Ethereum. After investigation, it was found that a blockchain security vendor issued a contract to let everyone “Stealing coins”.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
      <category term="blockchain" scheme="https://xlab.tencent.com/en/tags/blockchain/"/>
    
      <category term="ethereum" scheme="https://xlab.tencent.com/en/tags/ethereum/"/>
    
  </entry>
  
  <entry>
    <title>Pwning PHP developers</title>
    <link href="https://xlab.tencent.com/en/2018/04/02/pwning-php-developers/"/>
    <id>https://xlab.tencent.com/en/2018/04/02/pwning-php-developers/</id>
    <published>2018-04-02T02:48:18.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;em&gt;TL;DR&lt;/em&gt;&lt;br&gt;A php programmer who use xdebug’s remote debugging feature may affects RCE when he just access to attacker’s website in modern browsers.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
      <category term="xdebug" scheme="https://xlab.tencent.com/en/tags/xdebug/"/>
    
  </entry>
  
  <entry>
    <title>Return Flow Guard</title>
    <link href="https://xlab.tencent.com/en/2016/11/02/return-flow-guard/"/>
    <id>https://xlab.tencent.com/en/2016/11/02/return-flow-guard/</id>
    <published>2016-11-02T06:29:27.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;[DannyWei, lywang, FlowerCode] of Tencent Xuanwu Lab&lt;/p&gt;
&lt;p&gt;Here is a preliminary documentation of the RFG implementation. We will update it once we have new findings and corrections.&lt;/p&gt;
&lt;p&gt;We analyzed the Return Flow Guard introduced in Windows 10 Redstone 2 14942, released on October 7, 2016.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
  </entry>
  
  <entry>
    <title>CVE-2016-1707 Chrome Address Bar URL Spoofing on IOS</title>
    <link href="https://xlab.tencent.com/en/2016/10/10/cve-2016-1707-chrome-address-bar-url-spoofing-on-ios/"/>
    <id>https://xlab.tencent.com/en/2016/10/10/cve-2016-1707-chrome-address-bar-url-spoofing-on-ios/</id>
    <published>2016-10-10T03:18:36.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;Address Bar URL Spoofing on IOS Chrome (CVE-2016-1707), I report the vulnerability to Google in June 2016. Spoofing URL vulnerability can be forged a legitimate Web site address. Attacker can exploit this vulnerability to launch phishing attack.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
  </entry>
  
  <entry>
    <title>Pulse Secure Desktop Client (Juniper Junos Pulse) Privilege Escalation</title>
    <link href="https://xlab.tencent.com/en/2016/07/19/xlab-16-001/"/>
    <id>https://xlab.tencent.com/en/2016/07/19/xlab-16-001/</id>
    <published>2016-07-19T10:00:11.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;strong&gt;XLAB ID:&lt;/strong&gt; XLAB-16-001 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;CVE ID:&lt;/strong&gt; CVE-2016-2408 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Patch Status:&lt;/strong&gt; Fixed&lt;/p&gt;
    
    </summary>
    
    
      <category term="advisories" scheme="https://xlab.tencent.com/en/category/advisories/"/>
    
    
  </entry>
  
  <entry>
    <title>BadTunnel - A New Hope</title>
    <link href="https://xlab.tencent.com/en/2016/06/17/badtunnel-a-new-hope/"/>
    <id>https://xlab.tencent.com/en/2016/06/17/badtunnel-a-new-hope/</id>
    <published>2016-06-17T08:20:27.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;This article purposes a new attack model to hijack TCP/IP broadcast protocol across different network segment, named “BadTunnel”.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
  </entry>
  
  <entry>
    <title>Exceptions in Exceptions - Abusing Special Cases in System Exception Handling to Achieve Unbelievable Vulnerability Exploitation</title>
    <link href="https://xlab.tencent.com/en/2016/04/19/exception-in-exception/"/>
    <id>https://xlab.tencent.com/en/2016/04/19/exception-in-exception/</id>
    <published>2016-04-19T08:21:21.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;Memory Read / Write / Execute attributes are one of the most important part of system security. Usually it is mandatory to have writable attribute set before overwriting a block of memory, and executable attribute set before executing code in a block of memory, otherwise an exception is generated. However, there are some special cases in the Windows exception handling procedure that we can take advantage of. By abusing such exceptions, we could write to the unwritable, and execute the unexecutable.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
  </entry>
  
  <entry>
    <title>Use Chakra engine again to bypass CFG</title>
    <link href="https://xlab.tencent.com/en/2016/01/04/use-chakra-engine-again-to-bypass-cfg/"/>
    <id>https://xlab.tencent.com/en/2016/01/04/use-chakra-engine-again-to-bypass-cfg/</id>
    <published>2016-01-04T08:19:56.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;This post is initially inspired by a talk with @&lt;a href=&quot;https://twitter.com/tombkeeper&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;TK&lt;/a&gt;, during which I learned the process and detail on how to successfully bypass CFG (reference: use Chakra JIT to bypass DEP and CFG). Due to my interest in its technology, I spent some time reading related materials and found another position to bypass CFG. I would like to thanks @&lt;a href=&quot;https://twitter.com/tombkeeper&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;TK&lt;/a&gt; for enlightening me on the ideas and techniques mentioned in this post.&lt;/p&gt;
    
    </summary>
    
    
      <category term="Papers" scheme="https://xlab.tencent.com/en/category/Papers/"/>
    
    
  </entry>
  
  <entry>
    <title>Microsoft Internet Explorer And Microsoft Edge Object Use-After-Free Remote Code Execution Vulnerability</title>
    <link href="https://xlab.tencent.com/en/2015/12/29/xlab-15-025/"/>
    <id>https://xlab.tencent.com/en/2015/12/29/xlab-15-025/</id>
    <published>2015-12-29T09:59:19.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;strong&gt;XLAB ID:&lt;/strong&gt; XLAB-15-025 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;CVE ID:&lt;/strong&gt; CVE-2015-1752 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Patch Status:&lt;/strong&gt; Fixed&lt;/p&gt;
    
    </summary>
    
    
      <category term="advisories" scheme="https://xlab.tencent.com/en/category/advisories/"/>
    
    
  </entry>
  
  <entry>
    <title>Flash Player Memory Corruption in Display List Handling</title>
    <link href="https://xlab.tencent.com/en/2015/12/29/xlab-15-024/"/>
    <id>https://xlab.tencent.com/en/2015/12/29/xlab-15-024/</id>
    <published>2015-12-29T09:56:34.000Z</published>
    <updated>2026-02-28T12:17:58.735Z</updated>
    
    <summary type="html">
    
      &lt;p&gt;&lt;strong&gt;XLAB ID:&lt;/strong&gt; XLAB-15-024 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;CVE ID:&lt;/strong&gt; CVE-2015-8459 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Patch Status:&lt;/strong&gt; Fixed&lt;/p&gt;
    
    </summary>
    
    
      <category term="advisories" scheme="https://xlab.tencent.com/en/category/advisories/"/>
    
    
  </entry>
  
</feed>
