SentinelLabs Logo RGB WhitePurp
ABOUT
CVE DATABASE
CONTACT
VISIT SENTINELONE.COM

Max Van Amerongen

Max Van Amerongen is a Vulnerability Researcher at SentinelOne focusing on identifying security holes in critical software. Before joining SentinelOne, he had previously worked at F-Secure Labs where he successfully participated in the Pwn2Own hacking contest a number of times.
Firefox JIT Use After Frees Exploiting CVE 2020 26950 6
Security Research

Firefox JIT Use-After-Frees | Exploiting CVE-2020-26950

Max Van Amerongen / February 3, 2022

Learn how to dive into JIT compilers in JavaScript engines and follow along as we find a new set of exploit primitives in this previously patched bug.

Read More
CVE 2021 45388 NetUSB RCE Flaw In Millions Of End User Routers
Security Research

CVE-2021-45608 | NetUSB RCE Flaw in Millions of End User Routers

Max Van Amerongen / January 11, 2022

SentinelLabs has discovered a high severity flaw in NetUSB which could be remotely exploited to execute code in the kernel.

Read More
GSOh No Finding Vulnerabilities In VirtualBox Network Offloads 12
Security Research

GSOh No! Hunting for Vulnerabilities in VirtualBox Network Offloads

Max Van Amerongen / November 23, 2021

Inspired by Pwn2Own, SentinelLabs' researcher Max Van Amerongen discovered three CVEs, including two privilege escalations, in VirtualBox. Read more here.

Read More
Remote Linux Kernel Heap Overflow TIPC Module Allows Arbitrary Code Execution Ftr
Security Research

CVE-2021-43267: Remote Linux Kernel Heap Overflow | TIPC Module Allows Arbitrary Code Execution

Max Van Amerongen / November 4, 2021

SentinelLabs has discovered a heap overflow vulnerability in the TIPC module of the Linux Kernel, which can allow attackers to compromise an entire system.

Read More

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    May 8, 2025
  • Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    April 28, 2025
  • AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
    AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
    April 9, 2025

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2025 SentinelOne, All Rights Reserved.