what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 192 RSS Feed

Files from natashenka

Email addressnatashenka at google.com
First Active2015-08-19
Last Active2023-05-04
Adobe Flash AVC Slice Decoding Crash
Posted Oct 2, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from an AVC slice decoding crash.

tags | exploit
advisories | CVE-2016-4275
SHA-256 | 4aab2c6a327dcfd3e4e5ae3793a05ef13051c567e6e7b7095e4080605c3b2550
Adobe Flash MP4 Processing Overflow
Posted Oct 2, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from an overflow vulnerability when processing MP4 files.

tags | exploit, overflow
SHA-256 | 51908fb3a62f133d2a06ddf711f694d18139b52dca220df228dcd37584a52010
Adobe Flash Video Decompression Memory Corruption
Posted Sep 23, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from a memory corruption vulnerability in video decompression.

tags | exploit
SHA-256 | 6ab77f9cdd155daa4dc1957698507e9e4e763903c61c47078ea8d064042796a5
Adobe Flash Memory Freeing Crash
Posted Sep 23, 2016
Authored by Google Security Research, natashenka

There is a crash when the AVC decoder in Adobe Flash attempts to free memory, likely indicating memory corruption.

tags | exploit
advisories | CVE-2016-4275
SHA-256 | 06f1eb077ee1f466f06c46622473b0779c4d14ab7e40da39791e487f6e4b64d7
Adobe Flash Method Calls Use-After-Free
Posted Sep 8, 2016
Authored by Google Security Research, natashenka

If a method is called on a MovieClip in Adobe Flash, and a getter is set with the name of the method, the getter will get executed during the call, and can free the MovieClip, leading to a user-after-free.

tags | exploit
advisories | CVE-2016-4231
SHA-256 | 5297ca949527a1f37c7a68df5d64c04365012ff2f457cbb7ba111a0c2dac12ee
Adobe Flash Transform.colorTranform Getter Information Leak
Posted Sep 8, 2016
Authored by Google Security Research, natashenka

There is an information leak in Adobe Flash in the Transform.colorTranform getter. If the constructor for ColorTransform is overwritten with a getter using addProperty, this getter will execute when fetching the constructor, which can then free the MovieClip containing the Tranform.

tags | exploit
advisories | CVE-2016-4232
SHA-256 | 7063d81c59980eddcec6a6549e6a9eed2656761e3a99db80b256f91f6bbbdf51
Adobe Flash MovieClip Transform Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

There is a use-after-free in the Adobe Flash MovieClip Transform getter. If the Transform constructor is replaced with a getter using addProperty, this getter can free the MovieClip before it is accessed.

tags | exploit
advisories | CVE-2016-4230
SHA-256 | 8e0a48ee796dc46bf201b5bec60fb0c2fea4eaaff0ede8662854456151504e5c
Adobe Flash BitmapData.copyPixels Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

There is a use-after-free in Adobe Flash BitmapData.copyPixels. If the method is called on a MovieClip, and the MovieClip is deleted during parameter conversions, it is used to convert future parameters, even though it has already been freed.

tags | exploit
advisories | CVE-2016-4229
SHA-256 | 0a3401d2588c89c8cb83520304f111cda886ab6b1fa44838fdd32599be2f4efa
Adobe Flash Rectangle Return Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

Several methods in Adobe Flash return instances of the Rectangle class. There is a use-after-free in creating these objects for return. If the this object of the call is a MovieClip, the Rectangle instantiation will run on its thread. If a getter is added to this class's package, it will be invoked when fetching the rectangle constructor, which can free the method's thread, which will cause the Rectangle constructor to run on a thread which has been freed.

tags | exploit
advisories | CVE-2016-4228
SHA-256 | f898e72b34514ad22259dcefdd52f3d177b215cd0242a8842fd2e4e2e609f90c
Adobe Flash Selection.setFocus Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

There is a use-after-free in Adobe Flash Selection.setFocus. It is a static method, but if it is called with a this object, it will be called on that object's thread. Then, if it calls into script, for example, by calling toString on the string parameter, the object, and its thread will be deleted, and a use-after-free occurs.

tags | exploit
advisories | CVE-2016-4227
SHA-256 | fa507c4afbb1bc497d0cc5c2a99904cd2a73bd86ee4b1d906ad6cf627872c99b
Adobe Flash Stage.align Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

There is a use-after-free in the Adobe Flash Stage.align property setter. When the setter is called, the parameter is converted to a string early, as a part of the new use-after-free prevention changes. This conversion can invoke script, which if the this object is a MovieClip, can delete the object, deleting the thread the call is made from, which can lead to a use-after-free.

tags | exploit
advisories | CVE-2016-4226
SHA-256 | 66d1624a35df614e84e05e1f157c0e1769f423cb0522075826d8dfbcf3dae5fe
WebKit TypedArray.copyWithin Memory Corruption
Posted Jul 29, 2016
Authored by Google Security Research, natashenka

WebKit suffers from a memory corruption vulnerability in TypedArray.copyWithin.

tags | exploit
SHA-256 | a1a879392edefe9000a32a0b132faa9914f660c3f5583d951b4ba36dc59d1a5b
WebKit TypedArray.fill Memory Corruption
Posted Jul 29, 2016
Authored by Google Security Research, natashenka

WebKit suffers from a memory corruption vulnerability in TypedArray.fill.

tags | exploit
SHA-256 | dd867b4d358aaa6e14a0d03112c063c2e4ef03e466614c2eb27dcbda6488c1ef
Adobe Flash LMZA Property Decoding Heap Corruption
Posted Jul 8, 2016
Authored by Google Security Research, natashenka

This archive contains an images that causes heap corruption in Adobe Flash due to LMZA property decoding.

tags | exploit
systems | linux
advisories | CVE-2016-4137
SHA-256 | b4637f957856cf2b90fc817391db88b8ba409c89663c13b2d689553ce536952b
Adobe Flash ATF Image Packing Overflow
Posted Jul 8, 2016
Authored by Google Security Research, natashenka

There is a heap overflow in ATF image packing. The file included in this archive demonstrates the vulnerability.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-4138
SHA-256 | 75949283b275ba71dc670b094f371b7c75020394f96a47c29fb5a1af31f4c0a4
Adobe Flash JXR Processing Double Free
Posted Jul 8, 2016
Authored by Google Security Research, natashenka

This JXR file causes a heap overflow when loaded in Adobe Flash.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-4136
SHA-256 | 47641153c895e5582ce7bbe51e07e71ce0f609705b429f68ad1cbb2577d62040
Adobe Flash ATF Processing Overflow
Posted Jul 8, 2016
Authored by Google Security Research, natashenka

This ATF file causes a heap overflow in ATF processing in Adobe Flash.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-4135
SHA-256 | bdeb9fd0af03716c83afcdffd2dcedb61fcac2b8c16f2ae666d18b689dc5e387
Adobe Flash addProperty Use-After-Free
Posted May 16, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from a use-after-free vulnerability in addProperty.

tags | exploit
systems | linux
advisories | CVE-2016-4108
SHA-256 | 1b2c5c8671f279a72c51ff397907b306c28103beaa466105adb2ca954f9d46cf
Adobe Flash MP4 File Stack Corruption
Posted May 16, 2016
Authored by Google Security Research, natashenka

A malicious mp4 file can cause stack corruption in Adobe Flash.

tags | exploit
systems | linux
advisories | CVE-2016-1096
SHA-256 | 5c20d0caed9aa474e926c8c2f3fe70234702e7285a0649e165699ff480f97a1e
Adobe Flash ATF Processing Heap Overflow
Posted May 16, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from an image reading / ATF processing heap overflow vulnerability.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-1101
SHA-256 | 6ab52e72a9a6a81d884f0790ee76e2e4e5c1fdba6288fdf33faf2133a716494c
Adobe Flash Raw 565 Texture Processing Overflow
Posted May 16, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from an overflow vulnerability when processing raw 565 textures.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-1103
SHA-256 | 504aba21194f2136a5269538dd0ff91bcb2d6a8b0436e0fbcbc28e61f0c2733d
Adobe Flash MovieClip.duplicateMovieClip Use-After-Free
Posted May 16, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from a use-after-free vulnerability in MovieClip.duplicateMovieClip.

tags | exploit
systems | linux
advisories | CVE-2016-1011
SHA-256 | 5ad69e7bbae09810ea7b7de4e3e2f4fc3530e0ee1b6ffa6aec93708d76560ae5
Adobe Flash SetNative Use-After-Free
Posted May 16, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from a use-after-free vulnerability in SetNative.

tags | exploit
systems | linux
advisories | CVE-2016-1106
SHA-256 | 9a6d96b29070bacd43654cab6667d8d574eb7dce3f26bf0a04dbf82f9fd630a0
Adobe Flash FileReference Type Confusion
Posted May 16, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from a type confusion vulnerability in the FileReference constructor.

tags | exploit
systems | linux
advisories | CVE-2016-1105
SHA-256 | 5e62f6a30d1de905673d6018a206c1cbc61970ba98c19b8f450978889283bbec
Adobe Flash Object Placing Out-Of-Bounds Read
Posted May 16, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from an out-of-bounds read when placing an object.

tags | exploit
systems | linux
advisories | CVE-2016-1104
SHA-256 | 334dac2fca295969639dab502bd3035daec81f42b9e1553b9e228ebd6893bd38
Page 5 of 8
Back34567Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close