exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2009-12-12

Mozilla Codesighs Memory Corruption
Posted Dec 12, 2009
Authored by Jeremy Brown

Mozilla Codesighs proof of concept memory corruption exploit.

tags | exploit, proof of concept
SHA-256 | ac84817c4dfc7ef08ccd8e283fbe5ef0d20f14b66c2ebc672172c6dda236941d
Easy RM To MP3 Converter 2.7.3.700 Buffer Overflow
Posted Dec 12, 2009
Authored by Vinod Sharma

Easy RM to MP3 Converter version 2.7.3.700 WinXP SP2 buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
systems | windows
SHA-256 | 45d99f278af1b5cd1081f086d57918b4e30a7a2f1883a3f06b5d27e9d890d2d1
Ubuntu Security Notice 872-1
Posted Dec 12, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 872-1 - It was discovered that the KIO subsystem of KDE did not properly perform input validation when processing help:// URIs. If a user or KIO application processed a crafted help:// URI, an attacker could trigger JavaScript execution or access files via directory traversal.

tags | advisory, javascript
systems | linux, ubuntu
SHA-256 | 1028e9817be9822e628da459f37c55fd239f9726df35e6b526868dc11530b5e0
Ubuntu Security Notice 871-2
Posted Dec 12, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 871-2 - USN-871-1 fixed vulnerabilities in KDE. This update provides the corresponding updates for KDE 4. This update also fixes a directory traversal flaw in KDE when processing help:// URLs. This issue only affected Ubuntu 8.10. Original advisory details: It was discovered that the KDE libraries could use KHTML to process an unknown MIME type. If a user or application linked against kdelibs were tricked into opening a crafted file, an attacker could potentially trigger XMLHTTPRequests to remote sites.

tags | advisory, remote, vulnerability
systems | linux, ubuntu
SHA-256 | 8554205cd8cfff3f6828791d0519c2b0ef24bc62dd8af0549c0706a9f92f563c
Ubuntu Security Notice 871-1
Posted Dec 12, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 871-1 - A buffer overflow was found in the KDE libraries when converting a string to a floating point number. If a user or application linked against kdelibs were tricked into processing crafted input, an attacker could cause a denial of service (via application crash) or possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that the KDE libraries could use KHTML to process an unknown MIME type. If a user or application linked against kdelibs were tricked into opening a crafted file, an attacker could potentially trigger XMLHTTPRequests to remote sites.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-0689
SHA-256 | 75082f2353ff3b42c699cee9462dcd44b407a01f5801f30ef5ee5074ffc41209
Thunderbird 2.0.0.23 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Thunderbird version 2.0.0.23 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | 9a6a391941b200a19efd9a43cd84797f49e731b5b7c082401291e365c9294a3d
Sunbird 0.9 Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Sunbird version 0.9 suffers from a remote array overrun that allows for code execution.

tags | exploit, remote, overflow, code execution
advisories | CVE-2009-0689
SHA-256 | 2483a1810a65e2b43ccfed2e7e173d84dd8e586834924704ffeccf778c51a7b4
Camino 1.6.10 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Camino version 1.6.10 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | e16541afa2295ecb3f4cbf992119b30a71799c09664819cedf8c4168e8bb4a6f
Flock 2.5.2 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Flock version 2.5.2 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | 3046782d52e5b5223a145b479d898e4e8979080472f8c526d055bf3af11ab4b5
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close