There is a use-after-free in the TextField.maxChars setter in Adobe Flash. If the maxChars the field is set to is an object with valueOf defined, the valueOf function can free…
>> CATEGORY: exploit
The included proof of concept causes a crash in ih264d_process_intra_mb in avc parsing, likely due to incorrect bounds checking in one of the memcpy or memset calls in the method.
If Color.setTransform in Adobe Flash is set to a transform that deletes the field it is called on, a use-after-free occurs.
An independent vulnerability laboratory researcher discovered multiple sql injection web vulnerabilities in the Dorma Web Content Management System.
The vulnerability laboratory core research team discovered a redirect and session web vulnerability in the official trend micro sso online service web-application.
The vulnerability laboratory core research team discovered a filter bypass issue and a persistent input validation vulnerability in the Python v2.7 v1.5.4 iOS mobile application.
Included in this archive is a whitepaper called Metaphor – A (real) real-life Stagefright exploit. It presents a thorough research on libstagefright and new techniques used to bypass ASLR. This…
Apple Quicktime versions prior to 7.7.79.80.95 suffer from .fpx and .psd file parsing memory corruption vulnerabilities. Multiple proof of concepts included.
The application interface MOBOTIX VMS allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain…
Apache OpenMeetings versions 1.9.x through 3.1.0 suffer from a path traversal vulnerability.