Exploit the possiblities
Showing 26 - 50 of 50 RSS Feed

Files from laginimaineb

First Active2016-05-02
Last Active2017-10-02
Android Javanano Compiler Arbitrary Class Loading / Instantiation
Posted Feb 24, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an arbitrary class loading and instantiation in the protobuf parcelable "javanano" compiler.

tags | exploit, arbitrary
MD5 | 9473ffd296828b7cc161bd571b5af78a
Android android.util.MemoryIntArray Inter-Process munmap
Posted Feb 9, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an inter-process munmap in android.util.MemoryIntArray vulnerability.

tags | exploit
advisories | CVE-2017-0411
MD5 | 3147c0b73da106491e2b2e1a3da588eb
Android android.util.MemoryIntArray Ashmem Race Conditions
Posted Feb 9, 2017
Authored by Google Security Research, laginimaineb

Android suffers from Ashmem race conditions in android.util.MemoryIntArray.

tags | exploit
advisories | CVE-2017-0412
MD5 | 74ca108622d8dd0147f29c255f3de00d
Android RKP rkp_set_init_page_ro Memory Corruption
Posted Feb 2, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP related memory corruption vulnerability in rkp_set_init_page_ro.

tags | exploit
MD5 | e9ced71e9d2e9e92f8f0acc93031a2bc
Android RKP Information Disclosure
Posted Feb 1, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP information disclosure vulnerability via s2-remapping physical ranges.

tags | exploit, info disclosure
MD5 | c8886b34542d30541c79aec54288d716
Android RKP EL1 Code Loading Bypass
Posted Feb 1, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP EL1 code loading bypass vulnerability.

tags | exploit, bypass
MD5 | 12f85e60ce1fd1b4a0ca4dd9425daf90
Android RKP Privilege Escalation
Posted Feb 1, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP privilege escalation via unprotected MSRs in EL1 to memory management control registers.

tags | exploit
MD5 | 7c5c704e2dc2291ce6737a7129cef42a
Android cfp_ropp_new_key_reenc / cfp_ropp_new_key RKP Memory Corruption
Posted Feb 1, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP memory corruption vulnerability in "cfp_ropp_new_key_reenc" and "cfp_ropp_new_key".

tags | exploit
MD5 | 1c5fc932f500fcdccdd9d0e9cbcbfaa3
Android pm_qos KASLR Bypass
Posted Jan 26, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a KASLR bypass in pm_qos.

tags | exploit
MD5 | a8442cdf28f88af1b8133c60f4fd8b3c
Android RKP Memory Corruption
Posted Jan 26, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP related memory corruption vulnerability in rkp_mark_adbd.

tags | advisory
MD5 | 7e81520365413a1dfd2ebd05eca4fa3c
Android fps sysfs Entry Buffer Overflow
Posted Jan 18, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a buffer overflow vulnerability in the fps sysfs entry.

tags | advisory, overflow
MD5 | cb0a3c0e8c2148d58531b94c7801c213
Android sec_ts Touchscreen Race Condition
Posted Jan 18, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a race condition in the sec_ts touchscreen sysfs interface.

tags | advisory
MD5 | af434b2abbbeb03cf6c5cc9326d53976
Android TSP sysfs cmd_store Overflows
Posted Jan 18, 2017
Authored by Google Security Research, laginimaineb

Android suffers from multiple overflows in TSP sysfs "cmd_store".

tags | exploit, overflow
MD5 | 88ba859b50db5b3ea71b611f7a4981ef
Android ssp_batch_ioctl Out-Of-Bounds Write
Posted Jan 17, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an out-of-bounds write in ssp_batch_ioctl.

tags | advisory
MD5 | 3114d8e090f2271dd7a1ebe1d3e15914
Android maxdsm Driver Kernel Information Disclosure
Posted Jan 5, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a kernel information disclosure vulnerability in the maxdsm_read function in the maxdsm driver.

tags | advisory, kernel, info disclosure
MD5 | 8cdd410c7c4e0afd20081c1d2595cefc
Android max86902 Driver Race Condition
Posted Jan 5, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a race condition in the max86902 driver sysfs interfaces.

tags | exploit
MD5 | d8bbf1d36708dc7a098f69de78b3439f
Samsung OTP TrustZone Buffer Overflow
Posted Jan 3, 2017
Authored by Google Security Research, laginimaineb

As a part of the KNOX extensions available on Samsung devices, Samsung provides a TrustZone trustlet which allows the generation of OTP tokens. The OTP TrustZone trustlet suffers from a stack buffer overflow.

tags | exploit, overflow
MD5 | 5630aec452992f4eccfb870ec3a4cbc7
TIMA Arbitrary Kernel Module Verification Bypass
Posted Jan 3, 2017
Authored by Google Security Research, laginimaineb

Samsung's lkmauth feature suffers from a kernel module verification bypass vulnerability.

tags | advisory, kernel, bypass
MD5 | 94c50ebfbad9ceb87ec411b72014c425
Samsung OTP Service Heap Overflow
Posted Jan 3, 2017
Authored by Google Security Research, laginimaineb

As a part of the KNOX extensions available on Samsung devices, Samsung provides a new service which allows the generation of OTP tokens and suffers from a heap overflow vulnerability.

tags | exploit, overflow
MD5 | 078ec7131a5d786edf86447fbce0664f
Samsung OTP OTP_GET_CRYPTO_DERIVED_KEY Buffer Overflow
Posted Jan 3, 2017
Authored by Google Security Research, laginimaineb

Stack buffer overflow and information disclosure vulnerabilities exist in the Samsung OTP TrustZone trustlet via OTP_GET_CRYPTO_DERIVED_KEY.

tags | advisory, overflow, vulnerability, info disclosure
MD5 | 718aa9c0eebb984d13427c2fec6e4280
Android tlc_server Heap Overflow
Posted Dec 29, 2016
Authored by Google Security Research, laginimaineb

Android suffers from a heap overflow vulnerability in the tlc_server via the LOAD_TUI_RESOURCE command.

tags | advisory, overflow
MD5 | eaa1fa22c33faa9c41779a49bc7c8169
Android system_server Code Loading Bypass
Posted Dec 2, 2016
Authored by Google Security Research, laginimaineb

As of Android Nougat, a new set of SELinux rules have been added which are designed to prevent system_server from loading arbitrary code into its address-space. However, as system_server is extremely privileged, there are a few vectors through which it may still load arbitrary code, thus bypassing the mitigation mentioned above.

tags | advisory, arbitrary
MD5 | 062fecbf9fe448b888fe819703696e28
Android Mitigation Bypass
Posted Dec 2, 2016
Authored by Google Security Research, laginimaineb

Because of a design bug in IOMX, the user-supplied sizes in the GET_PARAMETER and SET_PARAMETER calls ar e discarded before calling in to the responsible OMX code-paths. This has led to a variety of overflow-type bugs.

tags | advisory, overflow
advisories | CVE-2016-6717
MD5 | 2149438ed8ba4641a33b0380779c9f88
Android android.graphics.Bitmap Inter-Process munmap
Posted Dec 2, 2016
Authored by Google Security Research, laginimaineb

Bitmap objects can be passed between processes by flattening them to a Parcel in one process and un-flattening them in another. In order to conserve memory, there exists a code path which allows Bitmaps to be shared between processes by providing an ashmem-mapped file descriptor containing the Bitmap's raw pixel data. The android.graphics.Bitmap class illegally assumes that the size of the ashmem region provided by the user matches the actual underlying size of the Bitmap.

tags | exploit
advisories | CVE-2016-6707
MD5 | 4b0aa59901658c474356f9728685a71e
QSEE PRDiag* Privilege Escalation
Posted May 2, 2016
Authored by laginimaineb

Local privilege escalation exploit for Qualcomm's Secure Execution Environment (QSEE) that leverages PRDiag* commands.

tags | exploit, local
systems | linux
advisories | CVE-2015-6639
MD5 | 55a25c43b01fb4396d7212d488b2a910
Page 2 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    28 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close