exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 33 of 33 RSS Feed

Files from Chaouki Bekrar

First Active2010-05-14
Last Active2013-03-19
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Word. The vulnerability is caused by the use of an invalid pointer when processing bookmarks in a Word document, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Word file.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3216
SHA-256 | 7ce1d4bd8b76f0701a2b560b5fd7a76602d1a315b9a244c3c62d75b8c3cadbbf
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Word. The vulnerability is caused by an error when handling return values while parsing certain data in a Word document, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Word file.

tags | advisory, remote, arbitrary
advisories | CVE-2010-3215
SHA-256 | c57ab7fab72a2302f335bf2cf0de8374b7cfbb59403c45f2c989af2402cd27f1
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Word. The vulnerability is caused by an array indexing error when processing certain values in a Word document, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Word file.

tags | advisory, remote, arbitrary
advisories | CVE-2010-2750
SHA-256 | 0fb1f5b0e5796143b6107764842e6e1084e05e0b90c920260316a7190a3967be
VUPEN Security Advisory
Posted Oct 15, 2010
Authored by Chaouki Bekrar, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Office Word. The vulnerability is caused by a buffer overflow error when processing certain data within a Word document, which could be exploited by remote attackers to execute arbitrary code by tricking a user into opening a specially crafted Word file.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-2748
SHA-256 | ea728d4aafddcb2ca6f3cc670c137bdf07a133cc72b228e4fbea07d12656dc01
Adobe Shockwave 0xFFFFFF49 3D Block Code Execution Vulnerability
Posted May 14, 2010
Authored by Chaouki Bekrar | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Adobe Shockwave Player. This vulnerability is caused due to a memory corruption error when processing 0xFFFFFF49 3D blocks within Director files, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page. Versions prior to 11.5.7.609 are affected.

tags | advisory, web, arbitrary
advisories | CVE-2010-1283
SHA-256 | fca3c4b1182174601636ba9081feb0d22ccfa325385cdaa1d84cce75cdd4a5ee
Adobe Shockwave DIRAPI Multiple Code Execution Vulnerabilities
Posted May 14, 2010
Authored by Chaouki Bekrar | Site vupen.com

VUPEN Vulnerability Research Team discovered seven critical vulnerabilities in Adobe Shockwave Player. These vulnerabilities are caused due to memory corruptions, array indexing, heap overflows and invalid pointers when processing malformed files, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page. Versions prior to 11.5.7.609 are affected.

tags | advisory, web, overflow, arbitrary, vulnerability
advisories | CVE-2010-1280
SHA-256 | 350e0f3198e35fcf0c1c75b940682fbeffa174ddc0b609b86fc1a35c428f798e
Adobe Shockwave 3D Two Code Execution Vulnerabilities
Posted May 14, 2010
Authored by Chaouki Bekrar | Site vupen.com

VUPEN Vulnerability Research Team discovered two critical vulnerabilities in Adobe Shockwave Player. These vulnerabilities are caused due to memory corruption errors when processing malformed 3D Director files, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page. Versions prior to 11.5.7.609 are affected.

tags | advisory, web, arbitrary, vulnerability
advisories | CVE-2010-1284
SHA-256 | 8fe87b7b044004faab22d9d44d62f036a4b9045db946887eb957b795f9911df9
Adobe Shockwave IML32 Multiple Code Execution Vulnerabilities
Posted May 14, 2010
Authored by Chaouki Bekrar | Site vupen.com

VUPEN Vulnerability Research Team discovered eleven critical vulnerabilities in Adobe Shockwave Player. These vulnerabilities are caused due to integer overflows, array indexing, and memory corruption errors when processing malformed Shockwave or Director files, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page. Versions prior to 11.5.7.609 are affected.

tags | advisory, web, overflow, arbitrary, vulnerability
advisories | CVE-2010-0129
SHA-256 | c2ffc80cdc36096e80f2c00c27491571ea28746b9e6cc10037e4cfabbf25a862
Page 2 of 2
Back12Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    22 Files
  • 8
    Jun 8th
    17 Files
  • 9
    Jun 9th
    20 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close