«
Expand/Collapse
30 items tagged "style"
Related tags:
webkit [+],
code execution [+],
house [+],
web design [+],
web [+],
memory corruption [+],
letter style [+],
file [+],
disclosure [+],
cross site scripting [+],
code [+],
zdi [+],
tag [+],
style version [+],
style tag [+],
mozilla firefox [+],
mozilla [+],
inspector remote [+],
handling [+],
hacks [+],
design [+],
apple safari [+],
text element [+],
service vulnerability [+],
remote [+],
library [+],
element [+],
denial of service [+],
day [+],
apple webkit [+],
zero day [+],
wrestling one [+],
wifi [+],
webapps [+],
user [+],
tunes [+],
texml [+],
sumo [+],
style sheet [+],
style element [+],
streaming audio [+],
stack buffer [+],
robots [+],
robot [+],
recalculation [+],
radio [+],
quiz show [+],
pvc foam [+],
philippe chrtien [+],
listening to music [+],
letter [+],
jeremy [+],
jan [+],
information disclosure vulnerability [+],
google [+],
foam sheet [+],
directory traversal vulnerability [+],
digital [+],
chrome [+],
buzzer system [+],
buzzer [+],
button [+],
bugtraq [+],
buffer overflow [+],
audio [+],
arduino [+],
arcade button [+],
apple quicktime [+],
vulnerability [+]
-
-
14:01
»
Hack a Day
Theses are the team buzzer boxes which [Philippe Chrétien] built for his mother. She’s a big fan of quiz shows (we’re thinking Jeopardy and the like) and he thought she’d enjoy a proper setup for home gaming. Each unit consists of an arcade button and one LED, both housed in a project box. He uses [...]
-
-
8:00
»
Hack a Day
Instructables user [Jan] likes listening to music while hacking away in his workshop, but listening to the same CDs gets tired and boring after awhile. He contemplated listening to streaming audio over the Internet, but hated the idea of needing a computer around at all times. After a bit of reading, he found some information [...]
-
-
7:03
»
Hack a Day
[Jeremy] really wants to compete in some sumo bot wrestling, and in order to have robotic sumo wrestling one needs to make some robots, which is what [Jeremy's] build log is all about. The framework is made out of 6mm thick Sintra (which is a type of closed cell pvc foam sheet) with the use [...]
-
-
20:00
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-154 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. Authentication is not required to exploit this vulnerability. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within Webkit's support of the 'first-letter' css style. If a particular container has the first-letter style applied to it, the library will create a dual reference of text associated with the style for rendering. Later upon repainting or style recalculation, the application will access the freed memory which can lead to code execution under the context of the application.
-
-
12:01
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 10-142 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library's implementation of the first-letter style in the context of an SVG text element. Upon applying the style to this element, the library will calculate the height for determining the overflow for an inline box. While traversing the elements for the height, the library will utilize data from a non-existent linebox. Successful exploitation will lead to code execution under the context of the application.
-
12:00
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-142 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library's implementation of the first-letter style in the context of an SVG text element. Upon applying the style to this element, the library will calculate the height for determining the overflow for an inline box. While traversing the elements for the height, the library will utilize data from a non-existent linebox. Successful exploitation will lead to code execution under the context of the application.
-
-
18:15
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-098 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's Webkit. User interaction is required in that a user must visit a website or open a malicious document. The specific flaw exists within the way Webkit implements the 'first-letter' css style. If a container with the first-color style has it's contents replaced with a particular element, the library will create a dual reference of the style in order to apply to its contents. Later when the element is freed, the dangling reference will still be applied to the style. Upon navigating the document's styles for either repainting or style recalculation, the application will access the freed memory which can lead to code execution under the context of the application.