what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Fang Xing

First Active2005-11-05
Last Active2006-05-21
EEYEB-20060307.txt
Posted May 21, 2006
Authored by Fang Xing | Site eeye.com

eEye Digital Security has discovered a critical vulnerability in QuickTime Player. There is a integer overflow in the way QuickTime processes fpx format files. An attacker can create a fpx file and send it to the user via email, web page, or fpx file with activex.

tags | advisory, web, overflow, activex
advisories | CVE-2006-1249
SHA-256 | 43adc773eca673b0b8c59d551604cc2d366d6bcdd7893a6ec67c822b737336af
EEYEB-20051031.txt
Posted Jan 15, 2006
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical heap overflow in the Apple Quicktime player that allows for the execution of arbitrary code via a maliciously crafted GIF file. This flaw has proven to allow for reliable control of data on the heap chunk and can be exploited via a web site by using ActiveX controls.

tags | advisory, web, overflow, arbitrary, activex
systems | apple
advisories | CVE-2005-3713
SHA-256 | cc94c3ea3b6b057626aed1b68cf54134be69b95753dba40f5fb6627667ad207f
EEYEB-20051229.txt
Posted Jan 15, 2006
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in QuickTime Player. There is a stack overflow in the way QuickTime processes qtif format files. An attacker can create a qtif file and send it to the user via email, web page, or qtif file with activex and can directy overflow a function pointer immediately used so it can bypass any stack overflow protection in systems such as xp sp2 and 2003 sp1.

tags | advisory, web, overflow, activex
advisories | CVE-2005-3713
SHA-256 | f381d5232929605ca4544156e61651d6220094f6bc738402ffb8bfa678a9c719
EEYEB-20050801.txt
Posted Jan 11, 2006
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in the way Windows uncompresses Embedded Open Type fonts that would allow the author of a malicious web page to execute arbitrary code on the system of a user who visits the site, at the privilege level of that user.

tags | advisory, web, arbitrary
systems | windows
advisories | CVE-2006-0010
SHA-256 | 5d5df9c36634b0c7922e727101b818c6f338d4a69fd928cbba0a0a9bfd66cf07
EEYEB-20050701.txt
Posted Nov 12, 2005
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in RealPlayer that allows a remote attacker to reliably overwrite the heap with arbitrary data and execute arbitrary code in the context of the user under which the player is running. Systems Affected include Windows: RealPlayer 10.5 (6.0.12.1040-1235), RealPlayer 10, RealOne Player v2, RealOne Player v1, RealPlayer 8.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2005-2630
SHA-256 | e3816b5f02fa98d487c0d02730d88c67c2aa3470592f50c4c4f8273fea543cea
EEYEB-20050329.txt
Posted Nov 9, 2005
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a heap overflow vulnerability in the way the Windows Graphical Device Interface (GDI) processes Windows enhanced metafile images (file extensions EMF and WMF). An attacker could send a malicious metafile to a victim of his choice over any of a variety of media -- such as HTML e-mail, a link to a web page, a metafile-bearing Microsoft Office document, or a chat message -- in order to execute code on that user's system at the user's privilege level.

tags | advisory, web, overflow
systems | windows
advisories | CVE-2005-2124
SHA-256 | fbe0e7b4b08c26cdcbea6f41f6a2f4a4b4680d5b2050eb53b95436d4a2a12232
EEYEB-20050901.txt
Posted Nov 9, 2005
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in the way the Windows Graphical Device Interface (GDI) processes Windows Metafile (WMF) format image files that would allow arbitrary code execution as a user who attempts to view a malicious image. An attacker could send such a metafile to a victim of his choice over any of a variety of attack vectors, including an HTML e-mail, a link to a web page, a metafile-bearing Microsoft Office document, or a chat message.

tags | advisory, web, arbitrary, code execution
systems | windows
advisories | CVE-2005-2123
SHA-256 | fb070c689f7c1eb6298f3b908b6d3263adc6334948806fad6400732d941dbe93
EEYEB-20050627B.txt
Posted Nov 5, 2005
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in Macromedia Flash Player versions 6 and 7 that will allow an attacker to run arbitrary code in the context of the logged in user. An array boundary condition may be violated by a malicious SWF file in order to redirect execution into attacker-supplied data.

tags | advisory, arbitrary
advisories | CVE-2005-2628
SHA-256 | 9fed5fc5b6f35c0a68064bb3eba38b089f2ea09373f01b1eca9cbef787d60c1f
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close