1. Reverse Engineering >
  2. Exploits >
  3. PoC >
  4. #0daytoday #Socusoft Photo to Video Converter 8.07 - Registration Name Buffer Overflow Exploit [#0day #Exploit]


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

#0daytoday #Socusoft Photo to Video Converter 8.07 - Registration Name Buffer Overflow Exploit [#0day #Exploit]

RSS Kategorie Pfeil PoC vom | Quelle: 0day.today Direktlink öffnen

...

Webseite öffnen Komplette Webseite öffnen

Newsbewertung

Kommentiere zu #0daytoday #Socusoft Photo to Video Converter 8.07 - Registration Name Buffer Overflow Exploit [#0day #Exploit]






Ähnliche Beiträge

  • 1. SocuSoft Flash Slideshow Maker Professional bis 5.20 Cross Site Scripting vom 451.84 Punkte ic_school_black_18dp
    Es wurde eine problematische Schwachstelle in SocuSoft Flash Slideshow Maker Professional bis 5.20 entdeckt. Es betrifft eine unbekannte Funktion. Durch das Beeinflussen mit einer unbekannten Eingabe kann eine Cross Site Scripting-Schwachstelle ausgenutzt wer
  • 2. Hackers Exploiting Adobe Flash Zero-Day that Launching via a Microsoft Office Document vom 118.34 Punkte ic_school_black_18dp
    APT group widely exploiting the new Adobe flash 0day vulnerability via MS word document and the vulnerability allows attackers to execute the malicious flash object into victims machine. Attackers mainly targeting Russian state healthcare clinic through the crafted documen
  • 3. Game Engines: A 0-Day's Tale [20 May 2013] vom 111.8 Punkte ic_school_black_18dp
    Original PDF https://revuln.com/files/ReVuln_Game_Engines_0days_tale.pdf   GAME ENGINES: A 0-DAY’STALE Luigi Auriemma and Donato Ferrante ReVuln http://revuln.com [email protected] http://twitter.com/revuln 17 May 2013 Abstract This paper details several issues affecting different
  • 4. CVE-2017-8367 vom 102.19 Punkte ic_school_black_18dp
    Buffer overflow in Ether Software Easy MOV Converter 1.4.24, Easy DVD Creator, Easy MPEG/AVI/DIVX/WMV/RM to DVD, Easy Avi/Divx/Xvid to DVD Burner, Easy MPEG to DVD Burner, Easy WMV/ASF/ASX to DVD Burner, Easy RM RMVB to DVD Burner, Easy CD DVD Copy, MP3/AVI/MPEG/WMV/RM
  • 5. Android Bug Swatting with Sanitizers vom 98.67 Punkte ic_school_black_18dp
    Posted by Dan Austin, Android Security team LLVM, the compiler infrastructure used to build Android, contains multiple components that perform static and dynamic analysis. One set of these components that have been used extensively when analyzing Android are
  • 6. Steam Voip Security [04 Jul 2014] vom 87.55 Punkte ic_school_black_18dp
    Original PDF https://revuln.com/files/ReVuln_Steam_Voip_Security.pdf   STEAM VOIP SECURITY BY LUIGI AURIEMMA Overview and details about the security issues found in the Steam voice framework. ReVuln Ltd. http://revuln.com @revuln [email protected]
  • 7. Jok3R - Network And Web Pentest Framework vom 85.99 Punkte ic_school_black_18dp
    Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests.Its main goal is to save time on everything that can be automated during network/web pentest in order to enjoy more
  • 8. MMD-0037-2015 - A bad Shellshock & Linux/XOR.DDoS CNC "under the hood" vom 79.13 Punkte ic_school_black_18dp
    The background Yesterday was a hectic day when we gathered to check all recent ELF threats cross-fired in the internet traffic when I was informed of a recent shellshock attack. Seeing the command pattern of the one-liner shell executed script used I knew
  • 9. MMD-0037-2015 - A bad Shellshock & Linux/XOR.DDoS CNC "under the hood" vom 79.13 Punkte ic_school_black_18dp
    The background Yesterday was a hectic day when we gathered to check all recent ELF threats cross-fired in the internet traffic when I was informed of a recent shellshock attack. Seeing the command pattern of the one-liner shell executed script used I knew
  • 10. MMD-0037-2015 - A bad Shellshock & Linux/XOR.DDoS CNC "under the hood" vom 79.13 Punkte ic_school_black_18dp
    The background Yesterday was a hectic day when we gathered to check all recent ELF threats cross-fired in the internet traffic when I was informed of a recent shellshock attack. Seeing the command pattern of the one-liner shell executed script used I knew
  • 11. MMD-0037-2015 - A bad Shellshock & Linux/XOR.DDoS CNC "under the hood" vom 79.13 Punkte ic_school_black_18dp
    The background Yesterday was a hectic day when we gathered to check all recent ELF threats cross-fired in the internet traffic when I was informed of a recent shellshock attack. Seeing the command pattern of the one-liner shell executed script used I knew
  • 12. MMD-0037-2015 - A bad Shellshock & Linux/XOR.DDoS CNC "under the hood" vom 79.13 Punkte ic_school_black_18dp
    The background Yesterday was a hectic day when we gathered to check all recent ELF threats cross-fired in the internet traffic when I was informed of a recent shellshock attack. Seeing the command pattern of the one-liner shell executed script used I knew