exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 1,860 RSS Feed

Files from Google Security Research

First Active2000-02-18
Last Active2024-04-11
Windows Kernsl SID Table Poisoning
Posted Feb 10, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel registry has a SID table poisoning problem that leads to bad locking and other issues.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-21749, CVE-2023-21776
SHA-256 | c61efe9fac6bb66fd179b7a7a24132f82e660151050984d2cf1aae1c81d256ae
Windows Kernel Key Replication Issues
Posted Feb 10, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from multiple security issues in the key replication feature of registry virtualization.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-21748, CVE-2023-21772, CVE-2023-21773, CVE-2023-21774
SHA-256 | c3387e7bd189cc7e8d8449ad27e2b524a0fc939d2cc467c5961cc148cdbb9019
Windows Kernel Dangling Registry Link Node Use-After-Free
Posted Feb 9, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a use-after-free vulnerability due to a dangling registry link node under paged pool memory pressure.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-21747
SHA-256 | 54ec3add551cac7b508b2e8157d5a658c016115390f2b327d14cac78af270263
Android Binder VMA Management Security Issues
Posted Feb 6, 2023
Authored by Jann Horn, Google Security Research

Android Binder VMA management suffers from multiple security issues.

tags | exploit
advisories | CVE-2023-20928
SHA-256 | ab667a607662e113616863f74924dec25552f0f3627b28b830dcd1cef1dc0df9
Windows Kernel Registry Virtualization Memory Corruption
Posted Feb 6, 2023
Authored by Google Security Research, mjurczyk

Microsoft Windows suffers from a kernel memory corruption due to an insufficient handling of predefined keys in registry virtualization.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-21675
SHA-256 | ded3419927998aaa3da4fea3f80263227d729920c448e2a3cf6f50b41f8c867d
Chrome JSNativeContextSpecialization::BuildElementAccess Bypass
Posted Jan 18, 2023
Authored by Google Security Research, Glazvunov

Chrome suffers from a copy-on-write check bypass in JSNativeContextSpecialization::BuildElementAccess.

tags | exploit
SHA-256 | e557b72be711db4993d6e8b8912d3a2b8d46fe92a763b730da3097b4ad6eb837
XNU vm_map_copy_overwrite_unaligned Race Condition
Posted Jan 17, 2023
Authored by Google Security Research, Ian Beer

A XNU race condition in vm_map_copy_overwrite_unaligned allows writing to read-only mappings.

tags | exploit
advisories | CVE-2022-46689
SHA-256 | d28599b3adaf36ddb22cc63b493aedbe6d4bd9c80ab19441c0799cf163fd9d83
XNU VM Copy-On-Write Bypass
Posted Jan 17, 2023
Authored by Google Security Research, Ian Beer

XNU VM suffers from a copy-on-write bypass vulnerability due to incorrect shadow creation logic used during unaligned vm_map_copy operations.

tags | exploit, bypass
advisories | CVE-2022-46689
SHA-256 | 5a1b882267ecf571c7ea7314e620f51e45be202a17fa7c8a02fcea5a7a5b3641
libCoreEntitlements CEContextQuery Arbitrary Entitlement Returns
Posted Jan 13, 2023
Authored by Ivan Fratric, Google Security Research

On newer macOS/iOS versions, entitlements in binary signature blobs are stored in the DER format. libCoreEntitlements.dylib is the userspace library for parsing and querying such entitlements. The kernel has its own version of this library inside the AppleMobileFileIntegrity module. libCoreEntitlements exposes several functions, such as, for example, to convert entitlements to a dictionary representation (e.g. CEQueryContextToCFDictionary) or to query a specific entitlement (CEContextQuery). Unfortunately, different functions traverse the DER structure in a subtly different way, which allows one API to see one set of entitlements and another API to see a different set of entitlements.

tags | exploit, kernel
systems | apple, ios
advisories | CVE-2022-42855
SHA-256 | 9313c983a56ba7500d8b9861b16b1c103ae3a9454de12a836126f89cec59a1b8
WebKit CSSCrossfadeValue::crossfadeChanged Use-After-Free
Posted Jan 13, 2023
Authored by Google Security Research, Maddie Stone

WebKit suffers from a RenderMathMLToken use-after-free vulnerability in CSSCrossfadeValue::crossfadeChanged.

tags | exploit
SHA-256 | 2b3fca29e24705325c2e8f69792ec1fc6a23682a01cfd1f0ecc2b118ac3f4ef8
Windows Kernel NtNotifyChangeMultipleKeys Use-After-Free
Posted Jan 12, 2023
Authored by Google Security Research, mjurczyk

The Windows Kernel suffers from a use-after-free vulnerability due to bad handling of predefined keys in NtNotifyChangeMultipleKeys.

tags | exploit, kernel
systems | windows
advisories | CVE-2022-44683
SHA-256 | e31318a053707141296573a167ad796cc33514ff394bc3820404fedfd9233256
Linux khugepaged Race Conditions
Posted Jan 11, 2023
Authored by Jann Horn, Google Security Research

khugepaged on Linux races with rmap-based zap, races with GUP-fast, and fails to call MMU notifiers.

tags | exploit
systems | linux
SHA-256 | 4a7e3cd6f113b1a612bf06b09dde29c3da416e1312821de9fb2c055f4fb2c180
Linux 4.10 Use-After-Free
Posted Jan 10, 2023
Authored by Jann Horn, Google Security Research

Linux kernel version 4.10 suffers from a use-after-free vulnerability in __do_semtimedop() due to a lockless check outside the RCU section.

tags | exploit, kernel
systems | linux
SHA-256 | 07d8df8e54828f8f33482f1bf22aa6ffd633c656b7301bc40395e4379d31e449
Arm Mali CSF KBASE_REG_NO_USER_FREE Unsafe Use Use-After-Free
Posted Jan 10, 2023
Authored by Jann Horn, Google Security Research

The Mali driver tries to use the KBASE_REG_NO_USER_FREE flag to ensure that the memory region referenced by kbase_csf_tiler_heap::buf_desc_reg cannot be freed by userspace. However, this flag is only a single bit, and there can be multiple tiler heaps referencing the same memory region. This can lead to a use-after-free condition.

tags | exploit
advisories | CVE-2022-42716
SHA-256 | b873567924105769f827e9318b7b58298191410905a58cc3d3192c6ce29f3225
Linux videobuf2 Use-After-Free
Posted Jan 9, 2023
Authored by Google Security Research, Seth Jenkins

A vb2_mmap race with vb2_core_reqbufs leads to a use-after-free vulnerability in the Linux videobuf2 system.

tags | exploit
systems | linux
SHA-256 | d61a2203442211de402e6420b838d2d46c53994de2af84b1f343bfe1d3ad0231
Linux videobuf2 Use-After-Free
Posted Jan 6, 2023
Authored by Google Security Research, Seth Jenkins

An unsafe use of follow_pfn in get_vaddr_frames in videobuf2 on Linux leads to use-after-free issues or writes to ro-pages.

tags | exploit
systems | linux
SHA-256 | f545295793aea2d033e2e1720bb35ac7db855bcaa8fafcd55848d3dffe8ce90b
Linux PT_SUSPEND_SECCOMP Permission Bypass / Ptracer Death Race
Posted Jan 3, 2023
Authored by Jann Horn, Google Security Research

Linux suffers from two seccomp bugs with a PT_SUSPEND_SECCOMP permission bypass and ptracer death race condition.

tags | exploit
systems | linux
advisories | CVE-2022-30594
SHA-256 | 6d7f253f354c0c71a5692bbeb6bcd2a20b50e96fc05afeda0286131716d7b406
Chrome Synchronous Mojo Use-After-Free
Posted Jan 2, 2023
Authored by Google Security Research, Glazvunov

A design flaw in the Chrome Synchronous Mojo message handling introduces unexpected reentrancy and allows for multiple use-after-free vulnerabilities.

tags | exploit, vulnerability
advisories | CVE-2022-4178
SHA-256 | 8a4497a8ccb25f14e2dfe008e25cc2f2541b2d1e30345fff6f3169f4cac5313d
crewjam/saml Signature Bypass
Posted Jan 2, 2023
Authored by Google Security Research, Felix Wilhelm

The crewjam/saml go library is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements.

tags | exploit
advisories | CVE-2022-41912
SHA-256 | b98f26482dd59c89089a43c62936c2461318247bab55a7aaca8bb5e77ff8ba10
Windows HTTP.SYS Kerberos PAC Verification Bypass / Privilege Escalation
Posted Dec 8, 2022
Authored by James Forshaw, Google Security Research

The HTTP server implemented in HTTP.SYS on Windows handles authentication in a system thread which bypasses PAC verification leading to escalation of privilege.

tags | exploit, web
systems | windows
advisories | CVE-2022-35756, CVE-2022-41057
SHA-256 | 73ffca14ecbbd49fef40fa8d7691f553f1cd6ed289aaa1f61656fcd866416f5a
pixman pixman_sample_floor_y Integer Overflow
Posted Dec 7, 2022
Authored by Google Security Research

pixman versions prior to 0.42.2 suffer from an out-of-bounds write vulnerability in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.

tags | exploit, overflow
advisories | CVE-2022-44638
SHA-256 | e8d1ce418867fdf8b59910f6c8d388ea1ee007702037ba0202790a597b53fd71
Evernote Web Clipper Same-Origin Policy Bypass
Posted Dec 6, 2022
Authored by Tavis Ormandy, Google Security Research

Evernote Web Clipper suffered from a same-origin policy bypass vulnerability. The link to the demo exploit was a 403 at the time of addition and has not been included in this post.

tags | advisory, web, bypass
SHA-256 | edeb6d56c9d50dfe6a6599592c18c494c4d5dc6ad6ea545586270e0e19511589
Chrome blink::LocalFrameView::PerformLayout Use-After-Free
Posted Nov 25, 2022
Authored by Google Security Research, Glazvunov

Chrome suffers from a heap use-after-free vulnerability in blink::LocalFrameView::PerformLayout due to an incomplete fix for CVE-2022-3199.

tags | exploit
advisories | CVE-2022-3199, CVE-2022-3654
SHA-256 | ede5dbd6ee9c5895a1b02c8bc6cefd5dfe9adef84fd2fceb45bd3140cd0fa16b
XNU vm_object Use-After-Free
Posted Nov 25, 2022
Authored by Google Security Research, Ian Beer

XNU suffers from a vm_object use-after-free vulnerability due to invalid error handling in vm_map_enter.

tags | exploit
advisories | CVE-2022-42801
SHA-256 | 5ef6c77b173e377d874346d025662d6a74af50dd2789a4af20f0430f362f87df
XNU Dangling PTE Entry
Posted Nov 25, 2022
Authored by Google Security Research, Ian Beer

XNU suffers from a dangling PTE entry due to integer truncation when collapsing vm_object shadow chains.

tags | exploit
advisories | CVE-2022-32924
SHA-256 | 29e4042cd9a0b7666d0b7fda5c45703a1a078adf7f5202670b30f28e36559698
Page 5 of 75
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close