From c798f1b0beed9cb632ea9047c857145478a448e5 Mon Sep 17 00:00:00 2001 From: Chendo <39858639+ChendoChap@users.noreply.github.com> Date: Sun, 2 Aug 2020 23:11:37 +0200 Subject: [PATCH] port to 6.70 - 6.72 - update kpayload --- README.md | 4 ++-- index.html | 4 ++-- userland.js | 32 ++++++++++++++++---------------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/README.md b/README.md index b45aa1b..bffba24 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ -# PS4 6.50 - 6.51 Kernel Exploit +# PS4 6.70 - 6.72 Kernel Exploit --- ## Summary -In this project you will find a full implementation of the "ipv6 uaf" kernel exploit for the PlayStation 4 on 6.50 - 6.51. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. will launch the usual payload launcher (on port 9020). +In this project you will find a full implementation of the "ipv6 uaf" kernel exploit for the PlayStation 4 on 6.70 - 6.72. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. will launch the usual payload launcher (on port 9020). This bug was originally discovered by [Fire30](https://twitter.com/fire30), and subsequently found by [Andy Nguyen](https://twitter.com/theflow0/) diff --git a/index.html b/index.html index 5bf312e..10d2247 100644 --- a/index.html +++ b/index.html @@ -1,7 +1,7 @@ - PS4Brew 6.50 - 6.51 + PS4Brew 6.70 - 6.72