Home

/

Security

/

E-card by Exploit

/

About Me

/

Contact Me

 


IE 5.x-6.0 allows executing arbitrary programs using showHelp()
mk:@MSITStore: Directory Traveling vulnerability in Microsoft Internet Explorer 5.x and 6.0.
Exploit: Winamp skin file used to place .chm file in a known location, then calling it by using the vulnerability.
Visit Harmless Exploit

RealNetworks fails to address Cross-Site Scripting in RealOne Player
SMIL files in RealPlayer allows loading "file:javascript:" urls (file proxy vuln) in any zone/site, so we could operate in local zone.
Exploit: Using adodb.stream, we could download an exe file and replace wmplayer.exe with it,  we call mms:, so wmplayer.exe executed.
Visit Harmless Exploit

Microsoft Internet Explorer BMP file memory DoS vulnerability
58 bytes .bmp file against 51,539,607,528 GB memory.
Exploit: Uses several bmp files with different sizes to fill up your memory.
WARNING: Save your documents and anything else, this DoS may cause instability.
Read the WARINING before Clicking Here

Microsoft Outlook Express EML file Crash vulnerability
an eml file with "Sender:" without "From:" cause OE to crash.
Exploit: download and execute the eml file until the OE crash.
Download eml file in Zip archive

Adobe Acrobat Reader PDF file DoS vulnerability
by changing a value in PDF files it will cause adobe acrobat to allocate all of the memory to itself.
Exploit: the exploit will cause your memory to fill up.
WARNING: Save your documents and anything else, this DoS may cause instability.
Read the WARINING before Clicking Here

 


SecurityFocus         eEye         Malware         Liu Die Yu Homepage         Dror Shalev Internet Security Workshop         BUGTRAQ Mailing List Archive