Mozilla Codesighs proof of concept memory corruption exploit.
ac84817c4dfc7ef08ccd8e283fbe5ef0d20f14b66c2ebc672172c6dda236941d
Easy RM to MP3 Converter version 2.7.3.700 WinXP SP2 buffer overflow exploit that creates a malicious .m3u file.
45d99f278af1b5cd1081f086d57918b4e30a7a2f1883a3f06b5d27e9d890d2d1
Ubuntu Security Notice 872-1 - It was discovered that the KIO subsystem of KDE did not properly perform input validation when processing help:// URIs. If a user or KIO application processed a crafted help:// URI, an attacker could trigger JavaScript execution or access files via directory traversal.
1028e9817be9822e628da459f37c55fd239f9726df35e6b526868dc11530b5e0
Ubuntu Security Notice 871-2 - USN-871-1 fixed vulnerabilities in KDE. This update provides the corresponding updates for KDE 4. This update also fixes a directory traversal flaw in KDE when processing help:// URLs. This issue only affected Ubuntu 8.10. Original advisory details: It was discovered that the KDE libraries could use KHTML to process an unknown MIME type. If a user or application linked against kdelibs were tricked into opening a crafted file, an attacker could potentially trigger XMLHTTPRequests to remote sites.
8554205cd8cfff3f6828791d0519c2b0ef24bc62dd8af0549c0706a9f92f563c
Ubuntu Security Notice 871-1 - A buffer overflow was found in the KDE libraries when converting a string to a floating point number. If a user or application linked against kdelibs were tricked into processing crafted input, an attacker could cause a denial of service (via application crash) or possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that the KDE libraries could use KHTML to process an unknown MIME type. If a user or application linked against kdelibs were tricked into opening a crafted file, an attacker could potentially trigger XMLHTTPRequests to remote sites.
75082f2353ff3b42c699cee9462dcd44b407a01f5801f30ef5ee5074ffc41209
Thunderbird version 2.0.0.23 suffers from a remote array overrun that allows for arbitrary code execution.
9a6a391941b200a19efd9a43cd84797f49e731b5b7c082401291e365c9294a3d
Sunbird version 0.9 suffers from a remote array overrun that allows for code execution.
2483a1810a65e2b43ccfed2e7e173d84dd8e586834924704ffeccf778c51a7b4
Camino version 1.6.10 suffers from a remote array overrun that allows for arbitrary code execution.
e16541afa2295ecb3f4cbf992119b30a71799c09664819cedf8c4168e8bb4a6f
Flock version 2.5.2 suffers from a remote array overrun that allows for arbitrary code execution.
3046782d52e5b5223a145b479d898e4e8979080472f8c526d055bf3af11ab4b5