what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2009-12-12

Mozilla Codesighs Memory Corruption
Posted Dec 12, 2009
Authored by Jeremy Brown

Mozilla Codesighs proof of concept memory corruption exploit.

tags | exploit, proof of concept
SHA-256 | ac84817c4dfc7ef08ccd8e283fbe5ef0d20f14b66c2ebc672172c6dda236941d
Easy RM To MP3 Converter 2.7.3.700 Buffer Overflow
Posted Dec 12, 2009
Authored by Vinod Sharma

Easy RM to MP3 Converter version 2.7.3.700 WinXP SP2 buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
systems | windows
SHA-256 | 45d99f278af1b5cd1081f086d57918b4e30a7a2f1883a3f06b5d27e9d890d2d1
Ubuntu Security Notice 872-1
Posted Dec 12, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 872-1 - It was discovered that the KIO subsystem of KDE did not properly perform input validation when processing help:// URIs. If a user or KIO application processed a crafted help:// URI, an attacker could trigger JavaScript execution or access files via directory traversal.

tags | advisory, javascript
systems | linux, ubuntu
SHA-256 | 1028e9817be9822e628da459f37c55fd239f9726df35e6b526868dc11530b5e0
Ubuntu Security Notice 871-2
Posted Dec 12, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 871-2 - USN-871-1 fixed vulnerabilities in KDE. This update provides the corresponding updates for KDE 4. This update also fixes a directory traversal flaw in KDE when processing help:// URLs. This issue only affected Ubuntu 8.10. Original advisory details: It was discovered that the KDE libraries could use KHTML to process an unknown MIME type. If a user or application linked against kdelibs were tricked into opening a crafted file, an attacker could potentially trigger XMLHTTPRequests to remote sites.

tags | advisory, remote, vulnerability
systems | linux, ubuntu
SHA-256 | 8554205cd8cfff3f6828791d0519c2b0ef24bc62dd8af0549c0706a9f92f563c
Ubuntu Security Notice 871-1
Posted Dec 12, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 871-1 - A buffer overflow was found in the KDE libraries when converting a string to a floating point number. If a user or application linked against kdelibs were tricked into processing crafted input, an attacker could cause a denial of service (via application crash) or possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that the KDE libraries could use KHTML to process an unknown MIME type. If a user or application linked against kdelibs were tricked into opening a crafted file, an attacker could potentially trigger XMLHTTPRequests to remote sites.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-0689
SHA-256 | 75082f2353ff3b42c699cee9462dcd44b407a01f5801f30ef5ee5074ffc41209
Thunderbird 2.0.0.23 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Thunderbird version 2.0.0.23 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | 9a6a391941b200a19efd9a43cd84797f49e731b5b7c082401291e365c9294a3d
Sunbird 0.9 Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Sunbird version 0.9 suffers from a remote array overrun that allows for code execution.

tags | exploit, remote, overflow, code execution
advisories | CVE-2009-0689
SHA-256 | 2483a1810a65e2b43ccfed2e7e173d84dd8e586834924704ffeccf778c51a7b4
Camino 1.6.10 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Camino version 1.6.10 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | e16541afa2295ecb3f4cbf992119b30a71799c09664819cedf8c4168e8bb4a6f
Flock 2.5.2 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Flock version 2.5.2 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | 3046782d52e5b5223a145b479d898e4e8979080472f8c526d055bf3af11ab4b5
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close