Microsoft Internet Explorer textarea.defaultValue suffers from a memory disclosure vulnerability.
ac793dbfcfd50f86e76daaec9db6ea8bbe858fab353e8120a1fd34fc827042c7
Google Chrome suffers from an out-of-bounds read in layout.
2d3757be67305e873ee9adecfd5373daa82c75610751deda2131394581490717
Microsoft Edge and Internet Explorer suffer from a type confusion in HandleColumnBreakOnColumnSpanningElement.
acb3a39defa5f6c4a6541be344f794bfefad5affcf45b6f3a062c6bf6cbb9b2b
Apple WebKit suffers from a use-after-free vulnerability in HTMLFormElement::reset().
b158536bb0befe5398fad33dbc0a172677fb99626b2fbd089843ca3ebaffd3b0
Apple WebKit suffers from a type confusion vulnerability in RenderBox with accessibility enabled.
aecb62d731142db1516e19c7ad3ff31de9aea06eb36764a6f5dabffe85b7646b
Apple WebKit suffers from a HTMLKeygenElement type confusion vulnerability.
a3741d7c8f28b927fce34f6b61f23d32e35c5958bb3e06f77f2721bd8c990e10
Google Chrome suffers from a HTMLKeygenElement::shadowSelect() type confusion vulnerability.
92924ae358d484104a755cd03581b22f99405cbbdad6c145f777ffe6269d3fad
This Metasploit module exploits a vulnerability in Microsoft Internet Explorer. A memory corruption may occur when the Option cache isn't updated properly, which allows other JavaScript methods to access a deleted Option element, and results in code execution under the context of the user.
307b7adfa8d05c300b48db94ceb041a3ced231d646f14a788423d6874081b7c4
This is a proof of concept exploit that allows an attacker to execute arbitrary code via vectors involving a dereferenced memory address in Microsoft Internet Explorer 8. It leverages the issue discussed in MS11-081. The exploit is slightly crippled by the author.
31cef28f3ae91f47c652ada6f2b786f3ba4d464050c6d2c3cfd46b5a0f99df82
Two code execution vulnerabilities have been discovered in Internet Explorer. One vulnerability is caused by incorrectly validating integer parameter passed to the 'add' method of the Select HTML element. Another vulnerability is caused by a use-after-free bug triggered by accessing a previously deleted Option element.
00ed6913fc28235fa406b329358c7b4198e80bad1be3a6a32de2641d3a1cb323
There is a memory corruption vulnerability in TIFF file processing in Microsoft GDI+ that can be used to crash a vulnerable application and also to execute arbitrary code.
bdd741e4995e907c04dc70b34e10d128524fc033d85598a7865541896555676f
There is a vulnerability in Windows Media Audio Voice decoder distributed with Windows Media Player that allows remote code execution by opening a specially crafted web page.
b13d4b308ea79c8f831f71e5cd1f0456f63eb50ba6410288c818e83acdcbdff6
Microsoft Internet Explorer 6 suffers from a javascript vulnerability that allows for remote memory disclosure and remote code execution.
4df8eab8ee9d106ddee39f7fe4a638d19b5f617740aec69742d8195eb8d78922
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the componentFromPoint() method exposed through JavaScript. A problem in the implementation of this method for a particular object can be used to arbitrarily control memory access. By exploiting this an attacker can gain access to the target system under the credentials of the currently logged in user.
9be0acd20b531207b7045fac59a05cffd27dc61dad5ba2ffc9c186e175757549
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows XP, Server and Vista. User interaction is required in that a user must open a malicious image file or browse to a malicious website. The specific flaws exist in the GDI+ subsystem when parsing maliciously crafted GIF files. By supplying a malformed graphic control extension an attacker can trigger an exploitable memory corruption condition. Successful exploitation can result in arbitrary code execution under the credentials of the currently logged in user.
784909feca5f4676ce81ef75d3597d094f3a2f00e9f073866ec59152c5f86d2c
There is an integer overflow in PHP versions 5.2.1 and below in ext/gd/libgd/wbmp.c in the function readwbmp.
aa74b34ae08f9f37b439284153a51e2cc96cf731a3e5258a9d508e00d2e5d7c6
The MySQL version of Web Wiz version 8.05 suffers from a SQL injection vulnerability.
46e06067662bde321441a6d0fe076931e11a8bd16508818d4205deda46b5aa56
It appears that the WordPress blogging software was compromised and backdoored on Feb 25th, 2007 on the WordPress site.
34ddea36404bae61b3ed5fc2e049d2e8e59f33ea3c70b17cba90e92bcbaf2098