Mark Vincent Yason
@markyason
Software Reverse Engineer and Vulnerability Researcher | Independent Security Researcher | markyason.github.io
ID: 320117879
https://markyason.github.io/ 19-06-2011 10:11:00
13 Tweet
617 Followers
255 Following
The tag team of AbdulAziz Hariri and Mat Powell blog about exploiting a slick UAF in #Adobe #Reader (CVE-2020-9715). The exploit was submitted to us by Mark Vincent Yason and patched last month. bit.ly/355EBi2
Finding an info leak is a key step to a successful exploit chain. Mat Powell details one such leak in #Adobe #Reader that can disclose the base address of Annots.api. Originally reported by Mark Vincent Yason, the details of this stellar bug (with video) are at bit.ly/3k1eWfS
In a new guest blog, Mark Vincent Yason talks about some of the #Adobe #Reader vulns he reported. Two of these bugs, in particular, CVE-2021-28632 and CVE-2021-39840, are related UAF bugs even though they were patched months apart. Read the details at zerodayinitiative.com/blog/2021/10/2…
A Peek into IE 10’s Enhanced Protected Mode Sandbox - securityintelligence.com/internet-explo… via IBM X-Force #ibmxforce #IE10
.Mark Vincent Yason discusses the attack surface of Microsoft's new #Windows10 EdgeHTML rendering engine -- #BHUSA Briefing ow.ly/N9hZM