A Google Sentinel roblax exploit that can bypass the RoblOX security filter is back in the wild, thanks to a new security researcher who spotted it using a new exploit that was made available to him last week.
The new vulnerability is still not widely used by the general public, but Google’s vulnerability team has announced the exploit as CVE-2017-0277.
Google has patched the vulnerability since April 26, 2018, so the new exploit should be widely available until it’s patched.
Google’s blog post about the exploit also states that the exploit works in “a variety of environments,” which could mean that attackers can exploit the vulnerability in any environment where Roblax uses the filter.
While it seems unlikely that this exploit will be widely used for any other purpose, this vulnerability will be a huge boost for security researchers, as it opens up the possibility of discovering and exploiting other Roblcox vulnerabilities that haven’t been discovered yet.
Google also noted that it has not yet fixed the vulnerability, but said that the company is working to do so.
“The exploit has not been updated since the release of April 26,” the blog post says.
“We have not yet received reports of this issue and are actively investigating this issue.
Our priority is to quickly fix the issue as soon as possible, but we have not fixed the bug yet.”
Google’s security team also notes that the vulnerability does not affect RoblX users who are running the latest version of Roblx, which is currently 3.9.5.
Google recommends users update their Roblix software as soon after the patch is available.
Google and RoblAX are also actively working on other Roblex-related bugs and vulnerabilities, including a new RobleX-based malware called “Rambo,” which has been found to exploit the same vulnerability.