«
Expand/Collapse
925 items tagged "player"
Related tags:
vulnerabilities [+],
player versions [+],
integer overflow vulnerability [+],
hdtv [+],
digital [+],
blazevideo [+],
audio player [+],
adobe flash player [+],
remote buffer overflow [+],
cross site scripting [+],
cross [+],
remote buffer overflow vulnerability [+],
poc [+],
denial [+],
buffer overflow vulnerabilities [+],
buffer overflow exploit [+],
blazevideo hdtv player [+],
arbitrary code execution [+],
command execution [+],
aviosoft [+],
vulnerability [+],
zoom [+],
zinf [+],
wrf [+],
vlc player [+],
video [+],
tv player [+],
total [+],
splash [+],
site [+],
remote shell [+],
real player 10 gold [+],
real player 10 [+],
readav [+],
mymp [+],
musical [+],
multiple [+],
media player 2 [+],
m3u [+],
information disclosure vulnerability [+],
heap [+],
hd player [+],
gom [+],
gold [+],
flash player object [+],
exception [+],
denial of service exploit [+],
crash proof [+],
cisco webex [+],
cisco security advisory [+],
cisco security [+],
apple quicktime player [+],
apple quicktime [+],
zoom player 4 [+],
xion [+],
vulnerability research [+],
video player [+],
video flash [+],
version 6 [+],
version [+],
stack buffer [+],
shell metacharacters [+],
rokbox [+],
remote anything [+],
remote [+],
record [+],
professional proof [+],
poodll [+],
player v1 [+],
overflow vulnerability [+],
overflow code [+],
nuclear situation [+],
mpc [+],
mp3 player [+],
meeting sites [+],
iran [+],
infusion [+],
gom media player [+],
flv file [+],
flash players [+],
flash player version [+],
exception handling [+],
exception handler [+],
e mail attack [+],
director file [+],
d integer [+],
critical vulnerability [+],
crash [+],
congress invitation [+],
buffer [+],
anything [+],
advisory [+],
advanced [+],
activex component [+],
memory corruption [+],
wordpress [+],
stack [+],
security vulnerabilities [+],
remote security [+],
read access [+],
raspberry [+],
playerready [+],
player avi [+],
parameter [+],
longtail [+],
logic error [+],
lego [+],
injection [+],
html [+],
flv player [+],
flv [+],
cve [+],
corruption [+],
classic [+],
chiptune [+],
bugtraq [+],
based buffer overflow [+],
arduino [+],
access violation [+],
code execution [+],
denial of service [+],
vlc [+],
media [+],
zdi [+],
workstation [+],
webapps [+],
web player [+],
wav files [+],
wav [+],
vulnerable version [+],
vmware [+],
unity [+],
uninitialized pointer [+],
uninitialized [+],
toy [+],
totem [+],
swf [+],
string bass player [+],
stack overflow [+],
sql query [+],
sore wrists [+],
simultaneous notes [+],
sid [+],
shaun gehring [+],
security vulnerability [+],
security issues [+],
security control [+],
sample [+],
ryan [+],
retn [+],
propeller [+],
project [+],
pro versions [+],
printer [+],
pong [+],
pointer [+],
pocket [+],
plugin version [+],
player swf [+],
player plugin [+],
player player [+],
player logo [+],
player guitar [+],
player 1 [+],
pic microcontroller [+],
pic [+],
pandora radio [+],
pandora [+],
paddle [+],
overflow [+],
organ donor [+],
organ [+],
optical sensors [+],
oboe player [+],
oboe [+],
null pointer [+],
news [+],
music player [+],
music [+],
msp430 [+],
msp [+],
mp4a [+],
mp3 decoder [+],
moyes [+],
movie [+],
mod files [+],
microcontrollers [+],
microcontroller [+],
michael clemens [+],
meeting [+],
media logic [+],
matt [+],
malcolm messiter [+],
macos x [+],
lp player [+],
logo link [+],
logo [+],
linux [+],
link [+],
lee [+],
karafun [+],
internet radio player [+],
heap corruption [+],
harpsichord [+],
guitarists [+],
guitar [+],
gstreamer [+],
gom player [+],
fun project [+],
free mp3 player [+],
free [+],
fred murphy [+],
fpga [+],
fisher price [+],
fisher [+],
favorite toys [+],
fat16 file system [+],
external eeprom [+],
esx [+],
eeg [+],
educational construction [+],
dvd [+],
dtv [+],
drool [+],
donar [+],
digital tv [+],
digital playback [+],
design consideration [+],
decoder chips [+],
debug [+],
day [+],
d web [+],
critical security [+],
clock [+],
charles moyes [+],
bass project [+],
bass [+],
avi [+],
audiobook [+],
attiny [+],
assortment [+],
antoine [+],
airplay [+],
abbs [+],
90th birthday [+],
3d printer [+],
service vulnerability [+],
buffer overflow vulnerability [+],
exploits [+],
vlc media player [+],
hacks [+],
buffer overflow [+],
web browser plug [+],
red hat security [+],
audio [+],
adobe [+],
shockwave [+],
adobe shockwave player [+],
proof of concept [+],
flash [+],
yen,
yahoo player,
yahoo,
xtreamerpro,
xion player,
x quicktime,
x player,
wma,
windows media player network sharing service,
windows media player,
windows,
winamp player,
winamp,
webex player,
webex,
wave player,
wave,
wav player,
wav file,
wasent,
vpl,
vmware player,
vmusic,
vm player,
virtual machine,
vip,
vintage record,
victrola,
utilities,
uri parsing,
uri handling,
uri,
updates,
universal,
unicode,
ultimate,
u buffer,
type,
txt,
tunes,
tuber,
triologic,
trash pile,
topdownloads,
top notch,
time charm,
thunder,
syntactic analysis,
swf player,
sweet midi player,
sweet,
suse security,
super nintendo,
subtitle,
subaru outback,
subaru,
street performances,
street,
steampunk,
statsreader,
spider,
speaker mounted wav,
speaker mounted,
space,
sp3,
soritong,
sorinara,
sompl,
snes,
slouch,
skins,
sized music,
size parameters,
single chip,
sid player,
shockwave player,
service windows,
service,
serenity audio,
serenity,
seh,
security technologies,
security announcement,
sd card,
sap,
safer use,
s3m,
s system,
rumor,
rsp,
rosoft,
ron,
road trip,
ripper,
rfid,
retired,
remote controlled,
reggae,
recording,
record player,
realtek,
real player,
radio,
quintessential player,
quintessential,
quicktime,
quick player,
quick,
question,
pro,
postage,
portable cd player,
portable,
plus,
pls file,
pls,
pll,
plf,
playpad,
playlist,
player v3,
player v2,
player utilities,
player space,
player piano rolls,
player mp3,
player directory,
picomp,
pico mp,
pico,
piano,
php,
phonograph,
peter,
personal audio players,
personal audio player,
paper medium,
paper,
owen,
overflows,
order,
old time music,
ogg file,
ogg,
ocx,
observers,
npl,
nokia multimedia player,
nokia,
nki,
nintendo,
necessary connections,
nat,
mymp3 player,
muziic,
multiple buffer overflow,
multimedia,
multi media player,
multi,
mukmuk,
mr.x,
mplayer,
mpeg player,
mpeg,
mp4 files,
mp3s,
mp3 file,
mp3,
mjm,
minty mp3,
midi player v1,
midi playback,
midi,
microsoft windows media player,
microsoft windows media,
microsd memory card,
micro,
metal,
memory region,
memory,
media player version,
media player playlist,
media player classic,
media player 8,
mass,
markus,
mackeitone,
mac webcam,
m3u playlist,
m3u file,
m.j.m. quick,
m player,
local buffer overflow,
local,
links,
lib,
legal channels,
lan,
lalim,
kontakt,
kol,
kankan,
k lite codec pack,
k lite codec,
jumper wires,
julian,
jonathan danforth,
jeremy,
jamp,
ipod shuffle,
invalid pointer,
invaders,
internet,
integer overflow,
integer,
input validation,
infrared remote control,
image processing,
huge collection,
host os,
host ip,
host,
homemade music,
homemade,
homebrew,
home entertainment center,
home cinema,
home,
holes,
hijacking,
hero dvd,
heavy lifting,
heap memory,
header code,
harrison pham,
hanso,
hackaday,
groovy,
gretech,
google,
gif player,
gif,
generation chip,
free software updates,
followup,
flst,
flashback,
flash6,
flash player 9,
flash player 10,
flash player,
firmware,
finished board,
file processing,
file dos,
file,
fat,
extrememp,
exploit,
exe,
epod,
element code,
elecard mpeg player,
elecard,
eip,
e.m. total,
dvd x player,
dvd player,
dual boot with windows,
dos vulnerability,
dll,
diy,
divx player skins,
divx player,
divx,
ditch,
directory traversal,
digitizing,
digital video recording,
digital audio player,
development,
destiny media player,
destiny,
dep,
denial of service dos,
dbpoweramp,
data transport,
dangerousprototypes,
d parsing,
d object,
d assets,
cpu load,
core,
compact player,
compact,
commodore epod,
commodore 64,
comet,
cold hard cash,
code,
classic space,
cisco,
cinema 1,
chunk,
chasys,
charm,
chan,
cd ripper mp3,
cd player,
cd extractor,
cardboard packaging,
cardboard,
card,
bypass,
build,
bug,
buffer overflow exploits,
bs player,
brass,
brand,
bonus features,
bonus,
board fabrication,
board,
bling,
bertrand fan,
bertrand,
background noise,
avm,
avi file,
auxiliary input,
authentication,
atas,
asx file,
asx,
arbitrary code,
apsb,
apple mac os x,
apple mac os,
ape file,
ape,
announcement,
amr file,
alplayer,
alpha 2,
alpha,
akoff,
aic,
adobe updates,
adobe systems inc,
adobe flash player 10,
adobe director,
action script,
ace,
accurate copy,
abyssal,
Support,
Software,
General,
Bugs,
BackTrack,
6 606
-
-
11:14
»
Hack a Day
[Shaun Gehring] wanted an Internet radio player. Although he did have some troubles along the way, the final project turned out very well. Housed inside this case which used to house a spindle of bland CDs is a Raspberry Pi that plays Pandora radio and serves as an AirPlay receiver. The GPIO header of the [...]
-
-
16:00
»
SecuriTeam
Adobe Flash Player MP4 SequenceParameterSetNALUnit suffers from buffer overflow vulnerability.
-
-
16:00
»
SecuriTeam
Free Mp3 Player 1.0 suffers from local denial of service Vulnerability
-
-
16:00
»
SecuriTeam
Adobe Flash Player and AIR are prone to a remote buffer-overflow vulnerability due to a failure to properly bounds check user-supplied input.
-
-
16:00
»
SecuriTeam
Adobe Flash Player and AIR are prone to a remote integer-overflow vulnerability.
-
-
16:00
»
SecuriTeam
Adobe Flash Player and AIR are prone to a remote memory-corruption vulnerability.
-
-
11:01
»
Hack a Day
Since his string bass player isn’t always around [Antoine] built his own electric bass stand-in using the pedals from an old organ. The project — which he calls the Organ Donor — was inspired by a similar standalone organ pedal bass project. That instrument was built using a 555 timer to generate the sound. But [Antoine] [...]
-
-
16:00
»
SecuriTeam
VLC Media Player is prone to an arbitrary code-execution vulnerability.
-
-
22:04
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1569-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes three vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security bulletin APSB12-27, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.258.
-
22:04
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1569-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes three vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security bulletin APSB12-27, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.258.
-
22:04
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1569-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes three vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security bulletin APSB12-27, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.258.
-
-
16:00
»
SecuriTeam
Adobe Shockwave Player is prone to an unspecified memory-corruption vulnerability.
-
-
16:00
»
SecuriTeam
Adobe Shockwave Player is prone to an unspecified buffer-overflow vulnerability.
-
-
16:00
»
SecuriTeam
The FLV Player plugin for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input before using it in an SQL query.
-
-
16:00
»
SecuriTeam
Adobe Flash Player and AIR are prone to an unspecified security vulnerability.
-
-
14:01
»
Hack a Day
This LP player is made entirely out of LEGO parts. It plays the songs encoded on each record, but not by using a stylus in a groove. Instead, each LP has a color code on the bottom of it which is interpreted by the optical sensors underneath. In addition to its functionality [Anika Vuurzoon] made [...]
-
-
16:00
»
SecuriTeam
Adobe Flash Player and AIR are prone to a remote buffer-overflow vulnerability.
-
16:00
»
SecuriTeam
Media Player Classic WebServer is prone to a cross-site scripting vulnerability and a denial-of-service vulnerability.
-
-
9:00
»
Hack a Day
We’re very accustomed to seeing small media player builds, but [txyz]‘s ATtiny-powered audio player is one of the smallest and most feature-packed we’ve seen. The audio player is powered by the very small and very inexpensive ATtiny2313. The music is stored on an SD card – a maximum of 2GB of WAV files recorded in mono [...]
-
-
10:31
»
Hack a Day
[Michael Clemens] was looking for gifts for his Grandmother’s 90th Birthday. She is visually impaired and loves to be able to listen to audiobooks. The problem is that she doesn’t really get the hang of using electronics. He made things easy by building her a one-button audiobook player. The Raspberry Pi board is a perfect [...]
-
-
10:01
»
Hack a Day
[Dmitry] really went the distance with this project. It started as a broken DVD player scrapped for parts, and turned into this clock with way too many features. That link is a pretty a dry technical collection of the work. You’ll definitely want to have a look at it, but we’d suggest first watching the [...]
-
-
15:09
»
Hack a Day
[Malcolm Messiter] is an Oboe player who loves to play pieces from the Baroque era. This often means playing with a Harpsichord and he managed to acquire one to call his very own. Unfortunately you can’t play both instruments at once so he set out to automate the keyboard. What you see here is a fully working [...]
-
-
0:17
»
Packet Storm Security Advisories
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains six buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities.
-
0:17
»
Packet Storm Security Recent Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains six buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities.
-
0:17
»
Packet Storm Security Misc. Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains six buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities.
-
-
6:01
»
Hack a Day
Some people claim that the sound of vinyl is superior to digital playback. While this hack wont win any awards for audio quality, [Ryan]‘s LEGO Record Player is a unique use of one of our favorite toys. Most of the components including the tone arm, counterweight, and base, are built entirely of LEGO. A large gear from an educational construction set [...]
-
-
13:22
»
Packet Storm Security Advisories
VUPEN Vulnerability Research Team discovered a critical vulnerability in Adobe Flash Player. The vulnerability is caused by an integer overflow error in the "copyRawDataTo()" method within the "Matrix3D" class when processing malformed arguments, which could allow remote attackers execute arbitrary code via a specially crafted web page. Adobe Flash Player versions 11.3.300.271 and prior are affected.
-
13:22
»
Packet Storm Security Recent Files
VUPEN Vulnerability Research Team discovered a critical vulnerability in Adobe Flash Player. The vulnerability is caused by an integer overflow error in the "copyRawDataTo()" method within the "Matrix3D" class when processing malformed arguments, which could allow remote attackers execute arbitrary code via a specially crafted web page. Adobe Flash Player versions 11.3.300.271 and prior are affected.
-
13:22
»
Packet Storm Security Misc. Files
VUPEN Vulnerability Research Team discovered a critical vulnerability in Adobe Flash Player. The vulnerability is caused by an integer overflow error in the "copyRawDataTo()" method within the "Matrix3D" class when processing malformed arguments, which could allow remote attackers execute arbitrary code via a specially crafted web page. Adobe Flash Player versions 11.3.300.271 and prior are affected.
-
-
9:01
»
Hack a Day
[Fred Murphy] went ahead and revised his method of making custom records for a Fisher Price toy record player. He’s now able to 3D print the discs. The toy works much like a music box, with a comb in the “cartridge” of the record player and notches in the record that pluck the fingers of [...]
-
-
7:30
»
Hack a Day
If there wasn’t reason enough to love the Parallax Propeller, now you can listen to chiptunes with your own pocket SID audio player. This chiptune audio player uses the very unusual and very cool eight-core Parallax Propeller microcontroller. After soldering a few caps and resistors to a Propeller dev board to allow for audio out, [...]
-
-
15:56
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 11.3.300.271. By supplying a corrupt Font file used by the SWF, it is possible to gain arbitrary remote code execution under the context of the user, as exploited in the wild.
-
15:56
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 11.3.300.271. By supplying a corrupt Font file used by the SWF, it is possible to gain arbitrary remote code execution under the context of the user, as exploited in the wild.
-
15:56
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 11.3.300.271. By supplying a corrupt Font file used by the SWF, it is possible to gain arbitrary remote code execution under the context of the user, as exploited in the wild.
-
-
16:03
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1173-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-18, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.238.
-
16:03
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1173-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-18, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.238.
-
16:03
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1173-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-18, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.238.
-
-
17:00
»
SecuriTeam
VLC media player is prone to a heap-based buffer-overflow vulnerability.
-
-
17:00
»
SecuriTeam
Zoom Player is prone to a remote denial-of-service vulnerability.
-
4:11
»
Packet Storm Security Exploits
Various flash players, such as JWPlayer for MODx, Simple video flash player for Joomla, Poodll for Moodle, RokBox for Joomla, and RokBox for WordPress all suffer from a cross site scripting vulnerability.
-
4:11
»
Packet Storm Security Recent Files
Various flash players, such as JWPlayer for MODx, Simple video flash player for Joomla, Poodll for Moodle, RokBox for Joomla, and RokBox for WordPress all suffer from a cross site scripting vulnerability.
-
4:11
»
Packet Storm Security Misc. Files
Various flash players, such as JWPlayer for MODx, Simple video flash player for Joomla, Poodll for Moodle, RokBox for Joomla, and RokBox for WordPress all suffer from a cross site scripting vulnerability.
-
-
17:00
»
SecuriTeam
Donar Player is prone to a remote denial-of-service vulnerability.
-
9:01
»
Hack a Day
[Kayvon] just finished building this chiptune player based on a PIC microcontroller. The hardware really couldn’t be any simpler. He chose to use a PIC18F2685 just because it’s big enough to store the music files directly and it let him get away with not using an external EEPROM for that purpose. The output pins feed a [...]
-
-
18:58
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in Adobe Flash Player. By supplying a corrupt AMF0 "_error" response, it is possible to gain arbitrary remote code execution under the context of the user. This vulnerability has been exploited in the wild as part of the "World Uyghur Congress Invitation.doc" e-mail attack. According to the advisory, 10.3.183.19 and 11.x before 11.2.202.235 are affected.
-
18:58
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in Adobe Flash Player. By supplying a corrupt AMF0 "_error" response, it is possible to gain arbitrary remote code execution under the context of the user. This vulnerability has been exploited in the wild as part of the "World Uyghur Congress Invitation.doc" e-mail attack. According to the advisory, 10.3.183.19 and 11.x before 11.2.202.235 are affected.
-
18:58
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in Adobe Flash Player. By supplying a corrupt AMF0 "_error" response, it is possible to gain arbitrary remote code execution under the context of the user. This vulnerability has been exploited in the wild as part of the "World Uyghur Congress Invitation.doc" e-mail attack. According to the advisory, 10.3.183.19 and 11.x before 11.2.202.235 are affected.
-
-
17:00
»
SecuriTeam
Adobe Flash Player is prone to an unspecified remote memory-corruption vulnerability.
-
17:00
»
SecuriTeam
JW Player is prone to an HTML injection and a content spoofing vulnerability because it fails to sanitize user-supplied input.
-
-
6:00
»
Hack a Day
This portable sample player packs quite a punch. [Lee] wanted a nice portable way to take his samples with him, but refused to water-down the features just because it is portable. He set of goal of playing between 3-8 simultaneous notes from a large assortment of stored samples. Sample space was the first design consideration, [...]
-
-
19:22
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-0688-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-09, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the specially-crafted SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.183.19.
-
19:22
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-0688-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-09, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the specially-crafted SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.183.19.
-
19:22
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-0688-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-09, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the specially-crafted SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.183.19.
-
-
11:01
»
Hack a Day
It becomes obvious when you listen to this player guitar that it’s not a human being playing. But the only reason for that is the unrelenting precision with which the songs are played. In addition to that accuracy, it’s interesting to note that this tune is normally played by a group of guitarists but here [...]
-
-
21:26
»
Packet Storm Security Recent Files
Adobe Shockwave Player suffers from multiple memory corruption vulnerabilities when parsing .dir media files. This file has three advisories pertaining to these issues. Versions affected include Shockwave Player version 11.6.3r633, Module IMLLib.framework on MacOS X 10.7.2 (11C74).
-
-
14:30
»
Hack a Day
It seems [Charles Moyes] and [Mengxiang Jiang] won’t suffer from the sore wrists and thumbs from an Atari controller any longer. They built a version of Pong played by concentrating and relaxing while wearing an EEG headset. Right now, there’s only enough hardware for one player; when the player operating the red paddle concentrates the paddle [...]
-
-
22:57
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability in Adobe Flash Player for Linux, version 10.0.12.36 and 9.0.151.0 and prior. An input validation vulnerability allows command execution when the browser loads a SWF file which contains shell metacharacters in the arguments to the ActionScript launch method. The victim must have Adobe AIR installed for the exploit to work. This Metasploit module was tested against version 10.0.12.36 (10r12_36).
-
22:57
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability in Adobe Flash Player for Linux, version 10.0.12.36 and 9.0.151.0 and prior. An input validation vulnerability allows command execution when the browser loads a SWF file which contains shell metacharacters in the arguments to the ActionScript launch method. The victim must have Adobe AIR installed for the exploit to work. This Metasploit module was tested against version 10.0.12.36 (10r12_36).
-
22:57
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability in Adobe Flash Player for Linux, version 10.0.12.36 and 9.0.151.0 and prior. An input validation vulnerability allows command execution when the browser loads a SWF file which contains shell metacharacters in the arguments to the ActionScript launch method. The victim must have Adobe AIR installed for the exploit to work. This Metasploit module was tested against version 10.0.12.36 (10r12_36).
-
-
21:25
»
Packet Storm Security Exploits
Adobe Flash Player versions prior to 10.3.183.16 and 11.x before 11.1.102.63 suffer from an information disclosure vulnerability. This archive has research related to this issue, proof of concept source code, and a swf that demonstrates the issue.
-
21:25
»
Packet Storm Security Recent Files
Adobe Flash Player versions prior to 10.3.183.16 and 11.x before 11.1.102.63 suffer from an information disclosure vulnerability. This archive has research related to this issue, proof of concept source code, and a swf that demonstrates the issue.
-
21:25
»
Packet Storm Security Misc. Files
Adobe Flash Player versions prior to 10.3.183.16 and 11.x before 11.1.102.63 suffer from an information disclosure vulnerability. This archive has research related to this issue, proof of concept source code, and a swf that demonstrates the issue.
-
-
18:19
»
Packet Storm Security Misc. Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains three buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on a WebEx meeting site or on the computer of an online meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx meeting site. The players can also be manually installed for offline playback after downloading the application from www.webex.com. If the WRF player was automatically installed, it will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a WebEx meeting site. If the WRF player was manually installed, users will need to manually install a new version of the player after downloading the latest version from www.webex.com. Cisco has updated affected versions of the WebEx meeting sites and WRF player to address these vulnerabilities.
-
-
8:01
»
Hack a Day
A media player based on an Arduino and SD card has been done to death several times over, but that doesn’t mean we can’t appreciate [Matt]‘s MSP430 audio player. It’s a very nice piece of work that supports a FAT16 file system and only takes up 54 bytes of RAM. To make his dream of [...]
-
-
16:51
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-0434-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-07, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the specially-crafted SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.183.18.
-
16:51
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-0434-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-07, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the specially-crafted SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.183.18.
-
16:51
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-0434-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB12-07, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the specially-crafted SWF content. All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.183.18.
-
-
12:01
»
Hack a Day
Building an audio player is a fun project. It used to be quite a task to do so, but these days the MP3 decoder chips are full-featured which means that if you know how to talk to other chips with a microcontroller you’ve got all the skills needed to pull off the project. But that [...]
-
-
18:05
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in Adobe Flash Player. By supplying a corrupt .mp4 file loaded by Flash, it is possible to gain arbitrary remote code execution under the context of the user. This vulnerability has been exploited in the wild as part of the "Iran's Oil and Nuclear Situation.doc" phishing campaign.
-
18:05
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in Adobe Flash Player. By supplying a corrupt .mp4 file loaded by Flash, it is possible to gain arbitrary remote code execution under the context of the user. This vulnerability has been exploited in the wild as part of the "Iran's Oil and Nuclear Situation.doc" phishing campaign.
-
18:05
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in Adobe Flash Player. By supplying a corrupt .mp4 file loaded by Flash, it is possible to gain arbitrary remote code execution under the context of the user. This vulnerability has been exploited in the wild as part of the "Iran's Oil and Nuclear Situation.doc" phishing campaign.
-
-
9:11
»
Packet Storm Security Advisories
Adobe Shockwave Player versions 11.6.x.x suffer from a memory corruption vulnerability when parsing the field of KEY_ATOM of Director File.