«
Expand/Collapse
134 items tagged "event"
Related tags:
wordpress [+],
tags [+],
black hat [+],
authors [+],
ajax [+],
registration [+],
frank rieger [+],
chaos communication camp [+],
calendar component [+],
audio [+],
webapps [+],
usa [+],
txt [+],
joomla [+],
idefense security advisory [+],
code execution [+],
zero day [+],
sql injection [+],
sql [+],
server [+],
scripts [+],
opening [+],
mail server [+],
local information [+],
lightning talks [+],
lightning [+],
lexi pimendis [+],
information disclosure vulnerability [+],
hacking challenge [+],
contest [+],
congress [+],
cms [+],
acpid [+],
abstract definition [+],
zero [+],
webkit [+],
serendipity [+],
security [+],
script php [+],
script [+],
php versions [+],
php version [+],
memory corruption [+],
memory [+],
john perry barlow [+],
javascript event handler [+],
internet explorer user [+],
internet [+],
freetag [+],
event id [+],
eip [+],
denial of service [+],
communication [+],
chaos [+],
accurate reference [+],
23th [+],
vulnerability [+],
chaos communication congress [+],
windows [+],
video camp [+],
transport layer security [+],
sputnik [+],
soho [+],
security authors [+],
reverse engineering [+],
project [+],
plugin version [+],
onreadystatechange event [+],
object pointer [+],
multicast [+],
luiz eduardo tags [+],
log [+],
lfi [+],
jens ohlig [+],
inexpensive technology [+],
ids [+],
html [+],
hover [+],
hardware schematics [+],
harald welte [+],
frank rehberger [+],
forensic [+],
exploiting [+],
engineering [+],
echo [+],
cross site scripting [+],
correlation [+],
congress schedule [+],
calendar version [+],
box [+],
barnaby jack tags [+],
21th [+],
21c3 [+],
wifi [+],
weekend [+],
web applications [+],
web [+],
voip [+],
view [+],
tyler [+],
tree [+],
ticket [+],
tesla coils [+],
tesla [+],
svg documents [+],
spectacular fashion [+],
spark project [+],
source index [+],
source [+],
sink [+],
simple machines [+],
signatures [+],
service vulnerability [+],
security event [+],
script events [+],
scares [+],
sarah gordon tags [+],
sarah gordon [+],
ron gula [+],
retired [+],
radio [+],
privacy event [+],
privacy [+],
portal script [+],
plugin [+],
null pointer [+],
null [+],
north carolina [+],
niche [+],
news [+],
neel mehta [+],
musical [+],
multiple [+],
module [+],
matthew caldwell [+],
mark dowd [+],
malaysia [+],
makerfaire [+],
louisville [+],
lockpicking [+],
location commands [+],
linn [+],
kernel [+],
jomsocial [+],
john mcdonald [+],
intrusion detection [+],
input validation vulnerabilities [+],
input [+],
index [+],
how to throw a party [+],
hashes [+],
hardware events [+],
hacks [+],
hackerspace [+],
hackers [+],
hack in the box [+],
global event [+],
fraternal order [+],
forgery [+],
exploits [+],
exploit [+],
emulator [+],
dotnetnuke [+],
display [+],
def [+],
david byrne tags [+],
david byrne [+],
daily [+],
culture event [+],
contests [+],
cons [+],
concert [+],
con [+],
competition [+],
camp opening [+],
camp closing [+],
calender [+],
calendar registration [+],
calendar event [+],
c applications [+],
brian wilson ryan linn tags [+],
brian wilson [+],
bloomington [+],
bip bip [+],
bip [+],
bad [+],
arbitrary code execution [+],
application [+],
android [+],
amateur radio [+],
Community [+],
php [+],
event calendar [+],
tim pritlove [+],
calendar [+],
day [+],
slides [+],
event registration [+],
closing [+],
video [+],
com [+]
-
-
14:02
»
SecDocs
-
-
21:31
»
SecDocs
-
21:31
»
SecDocs
-
-
21:49
»
SecDocs
-
-
21:29
»
SecDocs
Authors:
Tim Pritlove Tags:
hacking Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The final get-together looking back at three days of genuine hacking experience at bcc. 21C3 tried to reinvent the Congress in a couple of ways. Did we succeed? Could we do better? Of course we can, but looking ahead to 22C3 should bring us finally on the road to a true international event that serves the community as one of the best and funniest events on this planet.
-
21:29
»
SecDocs
Authors:
Tim Pritlove Tags:
hacking Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: The final get-together looking back at three days of genuine hacking experience at bcc. 21C3 tried to reinvent the Congress in a couple of ways. Did we succeed? Could we do better? Of course we can, but looking ahead to 22C3 should bring us finally on the road to a true international event that serves the community as one of the best and funniest events on this planet.
-
-
6:26
»
SecDocs
Authors:
Jens Ohlig Tim Pritlove Tags:
social Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Opening ceremony of 21C3. Introduction to the Congress schedule, lectures and facilities. 21C3 is full of activities: lectures, workshops in the conference rooms and projects being active in the Hackcenter, at Art & Beauty, at Haecksen's room and other areas. In addition the AVIT VJ Conference and the German Lockpicking Championships are going along in parallel with 21C3 and complement it at the same time. The Infotresen is your first stop for all general questions and the NOC Help Disk tries to iron out problems with the network infrastructure. We also provide a small booklet explaining facilities and time tables to the user. You get it at the entrance when you have bought your ticket.
-
6:26
»
SecDocs
Authors:
Jens Ohlig Tim Pritlove Tags:
social Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Opening ceremony of 21C3. Introduction to the Congress schedule, lectures and facilities. 21C3 is full of activities: lectures, workshops in the conference rooms and projects being active in the Hackcenter, at Art & Beauty, at Haecksen's room and other areas. In addition the AVIT VJ Conference and the German Lockpicking Championships are going along in parallel with 21C3 and complement it at the same time. The Infotresen is your first stop for all general questions and the NOC Help Disk tries to iron out problems with the network infrastructure. We also provide a small booklet explaining facilities and time tables to the user. You get it at the entrance when you have bought your ticket.
-
-
8:41
»
SecDocs
Authors:
Tim Pritlove Tags:
social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Please join us as we look back to what happened and look forward to what's next on our agenda.
-
8:41
»
SecDocs
Authors:
Tim Pritlove Tags:
social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Please join us as we look back to what happened and look forward to what's next on our agenda.
-
8:41
»
SecDocs
Authors:
Tim Pritlove Tags:
social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Please join us as we look back to what happened and look forward to what's next on our agenda.
-
-
2:56
»
SecDocs
Authors:
Lexi Pimendis Tags:
CTF Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The talk will give a deep view behing the scenes of creating a CTF-hacking challenge. Starting from a short analysis of requirements for such an event, the organizational work to be done, to the main topic: designing the actual contest and choosing the software to be hacked. This years CIPHER event was a larger hacking event for students from international universities. 14 teams gathered from four continents and fourteen countries to hack the other team's server and defend their own. The exercise is about hosting a server that initially runs multiple services, i.e. a webserver, a mail server and customized services. These have typical security vulnerabilities that allow to compromise the server. The goal is to maintain the services up and uncompromised for the duration of the game, scores are also given for exploiting weaknesses and gaining access to other team's servers. The contest was held within a VPN, to authenticate the teams and ensure that the contest will not leak 'surprises' on the remainder of the internet. The services were hosted on VMWare- images, so that the memory layout and starting conditions for each team were controlled and known to all participants. We will give an overview of the services used in the contest, how we build them and demonstrate the tools we used to run the contest. The main goal of the exercise was to teach students how to act in situations of constant pressure and ubiqituous insecurity. The skills to actively participate not only include programming languages but also system administration and knowledge about offensive techniques.
-
-
21:39
»
SecDocs
Authors:
Lexi Pimendis Tags:
CTF Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The talk will give a deep view behing the scenes of creating a CTF-hacking challenge. Starting from a short analysis of requirements for such an event, the organizational work to be done, to the main topic: designing the actual contest and choosing the software to be hacked. This years CIPHER event was a larger hacking event for students from international universities. 14 teams gathered from four continents and fourteen countries to hack the other team's server and defend their own. The exercise is about hosting a server that initially runs multiple services, i.e. a webserver, a mail server and customized services. These have typical security vulnerabilities that allow to compromise the server. The goal is to maintain the services up and uncompromised for the duration of the game, scores are also given for exploiting weaknesses and gaining access to other team's servers. The contest was held within a VPN, to authenticate the teams and ensure that the contest will not leak 'surprises' on the remainder of the internet. The services were hosted on VMWare- images, so that the memory layout and starting conditions for each team were controlled and known to all participants. We will give an overview of the services used in the contest, how we build them and demonstrate the tools we used to run the contest. The main goal of the exercise was to teach students how to act in situations of constant pressure and ubiqituous insecurity. The skills to actively participate not only include programming languages but also system administration and knowledge about offensive techniques.
-
21:39
»
SecDocs
Authors:
Lexi Pimendis Tags:
CTF Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The talk will give a deep view behing the scenes of creating a CTF-hacking challenge. Starting from a short analysis of requirements for such an event, the organizational work to be done, to the main topic: designing the actual contest and choosing the software to be hacked. This years CIPHER event was a larger hacking event for students from international universities. 14 teams gathered from four continents and fourteen countries to hack the other team's server and defend their own. The exercise is about hosting a server that initially runs multiple services, i.e. a webserver, a mail server and customized services. These have typical security vulnerabilities that allow to compromise the server. The goal is to maintain the services up and uncompromised for the duration of the game, scores are also given for exploiting weaknesses and gaining access to other team's servers. The contest was held within a VPN, to authenticate the teams and ensure that the contest will not leak 'surprises' on the remainder of the internet. The services were hosted on VMWare- images, so that the memory layout and starting conditions for each team were controlled and known to all participants. We will give an overview of the services used in the contest, how we build them and demonstrate the tools we used to run the contest. The main goal of the exercise was to teach students how to act in situations of constant pressure and ubiqituous insecurity. The skills to actively participate not only include programming languages but also system administration and knowledge about offensive techniques.
-
21:39
»
SecDocs
Authors:
Lexi Pimendis Tags:
CTF Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The talk will give a deep view behing the scenes of creating a CTF-hacking challenge. Starting from a short analysis of requirements for such an event, the organizational work to be done, to the main topic: designing the actual contest and choosing the software to be hacked. This years CIPHER event was a larger hacking event for students from international universities. 14 teams gathered from four continents and fourteen countries to hack the other team's server and defend their own. The exercise is about hosting a server that initially runs multiple services, i.e. a webserver, a mail server and customized services. These have typical security vulnerabilities that allow to compromise the server. The goal is to maintain the services up and uncompromised for the duration of the game, scores are also given for exploiting weaknesses and gaining access to other team's servers. The contest was held within a VPN, to authenticate the teams and ensure that the contest will not leak 'surprises' on the remainder of the internet. The services were hosted on VMWare- images, so that the memory layout and starting conditions for each team were controlled and known to all participants. We will give an overview of the services used in the contest, how we build them and demonstrate the tools we used to run the contest. The main goal of the exercise was to teach students how to act in situations of constant pressure and ubiqituous insecurity. The skills to actively participate not only include programming languages but also system administration and knowledge about offensive techniques.
-
-
17:00
»
SecuriTeam
acpid is prone to a local information-disclosure vulnerability.
-
-
21:39
»
SecDocs
Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: A welcome to the Camp. Explanation of facilities, organizational hints and and an introduction to the upcoming conference schedule.
-
-
14:09
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Definition: Lightning Talks is a daily event. which consists in one hour of several short talks. Each talk is limited to five minutes. Goal: There is one slot for Lightning Talks each day of the congress. The goal is to present 10 talks within each slot. So this might be up to 40 interesting talks in total.
-
14:03
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Definition: Lightning Talks is a daily event. which consists in one hour of several short talks. Each talk is limited to five minutes. Goal: There is one slot for Lightning Talks each day of the congress. The goal is to present 10 talks within each slot. So this might be up to 40 interesting talks in total.
-
-
15:47
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Definition: Lightning Talks is a daily event. which consists in one hour of several short talks. Each talk is limited to five minutes. Goal: There is one slot for Lightning Talks each day of the congress. The goal is to present 10 talks within each slot. So this might be up to 40 interesting talks in total.
-
15:36
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Definition: Lightning Talks is a daily event. which consists in one hour of several short talks. Each talk is limited to five minutes. Goal: There is one slot for Lightning Talks each day of the congress. The goal is to present 10 talks within each slot. So this might be up to 40 interesting talks in total.
-
-
21:42
»
SecDocs
Authors:
Harald Welte Milosch Meriac Tags:
wireless embedded Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Project Sputnik is the real-time in-building location tracking system present at the 23C3. The Sputnik is a small active 2.4GHz RF Beacon, whose signal is picked up by one or multiple of the 20+ Sputnik base stations installed in the event venue (bcc). Attendees of the 23C3 are able to voluntarily participate in this system by purchasing an inexpensive Sputnik transponder which they can carry with them during the whole event. In order to make this project attractive to hackers, the Sputnik hardware schematics and firmware source code will be published on the first day of the event, enabling hackers to enhance/replace the exiting firmware, and to add new applications such as peer-to-peer communication between multiple Sputniki. The location data (both raw and processed) will be available to the public via the congress network. This means that everyone has access to all data. The intention of the project is mainly to demonstrate what kind of surveillance is possible using off-the-shelf inexpensive technology, and to make hackers interested into exploring potential positive use cases for it.
-
-
21:38
»
SecDocs
Authors:
Harald Welte Milosch Meriac Tags:
wireless embedded Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Project Sputnik is the real-time in-building location tracking system present at the 23C3. The Sputnik is a small active 2.4GHz RF Beacon, whose signal is picked up by one or multiple of the 20+ Sputnik base stations installed in the event venue (bcc). Attendees of the 23C3 are able to voluntarily participate in this system by purchasing an inexpensive Sputnik transponder which they can carry with them during the whole event. In order to make this project attractive to hackers, the Sputnik hardware schematics and firmware source code will be published on the first day of the event, enabling hackers to enhance/replace the exiting firmware, and to add new applications such as peer-to-peer communication between multiple Sputniki. The location data (both raw and processed) will be available to the public via the congress network. This means that everyone has access to all data. The intention of the project is mainly to demonstrate what kind of surveillance is possible using off-the-shelf inexpensive technology, and to make hackers interested into exploring potential positive use cases for it.
-
12:36
»
SecDocs
Authors:
John Perry Barlow Tim Pritlove Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Opening event of the 23rd Chaos Communication Congress. After a welcome talk, the 23C3's keynote will be delivered.
-
12:26
»
SecDocs
Authors:
John Perry Barlow Tim Pritlove Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Opening event of the 23rd Chaos Communication Congress. After a welcome talk, the 23C3's keynote will be delivered.
-
12:26
»
SecDocs
Authors:
John Perry Barlow Tim Pritlove Tags:
hacking Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Opening event of the 23rd Chaos Communication Congress. After a welcome talk, the 23C3's keynote will be delivered.
-
-
17:00
»
SecuriTeam
Simple Machines is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
-
-
9:01
»
Hack a Day
This weekend, June 16th, the North Carolina Maker Faire will be happening. This is the 3rd year for this event and from what we’ve seen in the past, it should be pretty good. We realize that every site has its niche of event coverage that they should deliver. Engadget/Gizmodo need to show new phones and [...]
-
-
21:41
»
SecDocs
-
-
15:48
»
SecDocs
Authors:
Frank Rehberger Tags:
network Event:
Chaos Communication Camp 2011 Abstract: For scaling real time applications multicast transport is the enabling technology. This event will present solutions for multicast security, that can be used for group conferencing and scaling data distribution services as transport layer security. Keywords: SRTP, AES-CM, Keystream, Multimedia Internet KEYing
-
15:19
»
SecDocs
Authors:
Frank Rehberger Tags:
network Event:
Chaos Communication Camp 2011 Abstract: For scaling real time applications multicast transport is the enabling technology. This event will present solutions for multicast security, that can be used for group conferencing and scaling data distribution services as transport layer security. Keywords: SRTP, AES-CM, Keystream, Multimedia Internet KEYing
-
-
20:09
»
Packet Storm Security Advisories
iDefense Security Advisory 10.11.11 - Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Internet Explorer could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when a Javascript event handler such as "onload" is set to a Javascript object's attributes or childNodes collection. A event object is created and this object's memory is later freed; however, a reference to the object remains. When the reference is later used to access the event object, this now-invalid memory is treated as a valid object. The corrupt object's vtable is used to make an indirect function call. This may result in the execution of arbitrary code. Microsoft Internet Explorer 6 is vulnerable.
-
20:09
»
Packet Storm Security Recent Files
iDefense Security Advisory 10.11.11 - Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Internet Explorer could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when a Javascript event handler such as "onload" is set to a Javascript object's attributes or childNodes collection. A event object is created and this object's memory is later freed; however, a reference to the object remains. When the reference is later used to access the event object, this now-invalid memory is treated as a valid object. The corrupt object's vtable is used to make an indirect function call. This may result in the execution of arbitrary code. Microsoft Internet Explorer 6 is vulnerable.
-
20:09
»
Packet Storm Security Misc. Files
iDefense Security Advisory 10.11.11 - Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Internet Explorer could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when a Javascript event handler such as "onload" is set to a Javascript object's attributes or childNodes collection. A event object is created and this object's memory is later freed; however, a reference to the object remains. When the reference is later used to access the event object, this now-invalid memory is treated as a valid object. The corrupt object's vtable is used to make an indirect function call. This may result in the execution of arbitrary code. Microsoft Internet Explorer 6 is vulnerable.
-
-
8:01
»
Hack a Day
The guys from Bloomington’s Fraternal Order of Lock Sport (FOOLS) sure know how to throw a party! At this year’s DerbyCon event down in Louisville, the group put on an awesome event that combined lockpicking and drinking – what could be better? The Rumble Challenge is lock picking game where six people compete head to [...]
-
-
14:08
»
Hack a Day
Hackaday reader [Tyler Laseter] wrote in to tell us about an event that he and his fellow Tesla Orchestra team members are hosting next month. The “Open Spark Project” is a concert event taking place on May 14th, which melds together electricity and music in spectacular fashion. The event features two large Tesla coils which [...]
-
-
14:59
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 11-119 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Internet Explorer handles onPropertyChange function calls. When the onPropertyChange event handler is set to an object's attribute collection, it fails to keep an accurate reference counter to the event object. The effect of this can be that the program frees the event object while there are still references to it. This can result in remote code execution under the content of the current user.
-
14:59
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 11-119 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Internet Explorer handles onPropertyChange function calls. When the onPropertyChange event handler is set to an object's attribute collection, it fails to keep an accurate reference counter to the event object. The effect of this can be that the program frees the event object while there are still references to it. This can result in remote code execution under the content of the current user.
-
14:59
»
Packet Storm Security Misc. Files
Zero Day Initiative Advisory 11-119 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Internet Explorer handles onPropertyChange function calls. When the onPropertyChange event handler is set to an object's attribute collection, it fails to keep an accurate reference counter to the event object. The effect of this can be that the program frees the event object while there are still references to it. This can result in remote code execution under the content of the current user.
-
-
6:42
»
Carnal0wnage
A poster on one of the other android posts mentioned you can just telnet into the android app if you've got the emulator running.
Its easy to do and the preferred way if you just want to script events. Just telnet into localhost 5554 and you can issue emulator commands.
user@dev:~$ telnet localhost 5554
Trying ::1...
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Android Console: type 'help' for a list of commands
OK
help
Android console command help:
help|h|? print a list of commands
event simulate hardware events
geo Geo-location commands
gsm GSM related commands
kill kill the emulator instance
network manage network settings
power power related commands
quit|exit quit control session
redir manage port redirections
sms SMS related commands
avd manager virtual device state
window manage emulator window
help event
allows you to send fake hardware events to the kernel
available sub-commands:
event send send a series of events to the kernel
event types list all type aliases
event codes list all code aliases for a given type
event text simulate keystrokes from a given text
OK
help geo
allows you to change Geo-related settings, or to send GPS NMEA sentences
available sub-commands:
geo nmea send an GPS NMEA sentence
geo fix send a simple GPS fix
you get the idea...
-
-
18:15
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-100 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application duplicates event listeners in .svg documents. Upon creating an AnimateTransform object, the library will create a timer to handle the transformation and duplicate the object's event listener into Webkit's shadow tree of the image. Upon destruction of the shadow tree and the original tree, the application will destroy the Element containing the event listener twice. This can lead to code execution under the context of the application.
-
-
10:00
»
Packet Storm Security Recent Files
iDefense Security Advisory 03.30.10 - Remote exploitation of a use after free vulnerability in Microsoft Corp.'s Internet Explorer could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when an HTML object with an 'onreadystatechange' event handler is not properly freed. This event is used to perform actions when the state of some HTML object changes; for example, when a form has data input. Specifically, when certain properties of the object are changed, the event handler function object is freed, but a reference to it remains. When the object is later accessed, this invalid memory is treated as an object pointer, and one of its members is used to make an indirect function call. This results in the execution of arbitrary code.
-
10:00
»
Packet Storm Security Advisories
iDefense Security Advisory 03.30.10 - Remote exploitation of a use after free vulnerability in Microsoft Corp.'s Internet Explorer could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when an HTML object with an 'onreadystatechange' event handler is not properly freed. This event is used to perform actions when the state of some HTML object changes; for example, when a form has data input. Specifically, when certain properties of the object are changed, the event handler function object is freed, but a reference to it remains. When the object is later accessed, this invalid memory is treated as an object pointer, and one of its members is used to make an indirect function call. This results in the execution of arbitrary code.