science and technology Advantech WebAccess 7.2 Stack-Based Buffer Overflow By packetstormsecurity.com Published On :: Thu, 20 Nov 2014 16:34:36 GMT Core Security Technologies Advisory - Advantech WebAccess version 7.2 is vulnerable to a stack-based buffer overflow attack, which can be exploited by remote attackers to execute arbitrary code, by providing a malicious html file with specific parameters for an ActiveX component. Full Article
science and technology TRENDnet SecurView Wireless Network Camera TV-IP422WN Buffer Overflow By packetstormsecurity.com Published On :: Tue, 25 Nov 2014 15:45:15 GMT The TRENDnet UltraCam ActiveX Control UltraCamX.ocx suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions TV-IP422WN and TV-IP422W are affected. Full Article
science and technology IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow By packetstormsecurity.com Published On :: Tue, 02 Dec 2014 01:33:52 GMT The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522. Full Article
science and technology IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow By packetstormsecurity.com Published On :: Tue, 02 Dec 2014 01:36:36 GMT The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452. Full Article
science and technology X360 VideoPlayer ActiveX Control Buffer Overflow By packetstormsecurity.com Published On :: Tue, 17 Feb 2015 18:25:40 GMT This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code. Full Article
science and technology 1 Click Extract Audio 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:04:44 GMT 1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
science and technology 1 Click Audio Converter 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:55:55 GMT 1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
science and technology Tango DropBox 3.1.5 Active-X Heap Spray By packetstormsecurity.com Published On :: Fri, 19 Jun 2015 15:39:30 GMT Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO. Full Article
science and technology Tango FTP 1.0 Active-X Heap Spray By packetstormsecurity.com Published On :: Fri, 19 Jun 2015 15:41:56 GMT Tango FTP active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects version 1.0 build 136. Full Article
science and technology Kguard Digital Video Recorder Bypass Issues By packetstormsecurity.com Published On :: Wed, 24 Jun 2015 17:55:55 GMT A deficiency in handling authentication and authorization has been found with Kguard 104/108/v2 models. While password-based authentication is used by the ActiveX component to protect the login page, all the communication to the application server at port 9000 allows data to be communicated directly with insufficient or improper authorization. Proof of concept exploit included. Full Article
science and technology Advantech WebAccess 8.0 / 3.4.3 Code Execution By packetstormsecurity.com Published On :: Mon, 07 Sep 2015 14:33:33 GMT Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX. Full Article
science and technology LEADTOOLS Active-X DLL Hijacking By packetstormsecurity.com Published On :: Sat, 23 Jan 2016 11:11:11 GMT LEADTOOLS Active-X control suffers from multiple DLL side loading vulnerabilities. Full Article
science and technology Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 31 Oct 2016 06:22:22 GMT Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability. Full Article
science and technology UCanCode Remote Code Execution / Denial Of Service By packetstormsecurity.com Published On :: Thu, 24 Nov 2016 01:34:22 GMT UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks. Full Article
science and technology Avaya IP Office (IPO) 10.1 Active-X Buffer Overflow By packetstormsecurity.com Published On :: Sun, 05 Nov 2017 15:40:54 GMT Avaya IP Office (IPO) versions 9.1.0 through 10.1 suffer from an active-x buffer overflow vulnerability. Full Article
science and technology BarcodeWiz ActiveX Control Buffer Overflow By packetstormsecurity.com Published On :: Sat, 06 Jan 2018 18:33:30 GMT BarcodeWiz ActiveX Control versions prior to 6.7 suffers from a buffer overflow vulnerability. Full Article
science and technology Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues By packetstormsecurity.com Published On :: Wed, 06 Jun 2018 20:22:22 GMT scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities. Full Article
science and technology G DATA TOTAL SECURITY 25.4.0.3 Active-X Buffer Overflow By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 16:14:16 GMT G DATA TOTAL SECURITY version 25.4.0.3 suffers from an active-x buffer overflow vulnerability. Full Article
science and technology Adobe Flash Active-X 28.0.0.137 Remote Code Execution By packetstormsecurity.com Published On :: Mon, 24 Dec 2018 04:44:44 GMT Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit. Full Article
science and technology Ubuntu Security Notice USN-4058-1 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:09:46 GMT Ubuntu Security Notice 4058-1 - It was discovered that Bash incorrectly handled the restricted shell. An attacker could possibly use this issue to escape restrictions and execute any command. Full Article
science and technology Ubuntu Security Notice USN-4058-2 By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:47:57 GMT Ubuntu Security Notice 4058-2 - USN-4058-1 fixed a vulnerability in bash. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bash incorrectly handled the restricted shell. An attacker could possibly use this issue to escape restrictions and execute any command. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-4180-1 By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:38:23 GMT Ubuntu Security Notice 4180-1 - It was discovered that Bash incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. Full Article
science and technology Bash 5.0 Patch 11 Privilege Escalation By packetstormsecurity.com Published On :: Fri, 29 Nov 2019 16:40:01 GMT An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected. Full Article
science and technology Bash Profile Persistence By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 16:05:47 GMT This Metasploit module writes an execution trigger to the target's Bash profile. The execution trigger executes a call back payload whenever the target user opens a Bash terminal. A handler is not run automatically, so you must configure an appropriate exploit/multi/handler to receive the callback. Full Article
science and technology Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:25:29 GMT This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account. Full Article
science and technology Google Chrome 80.0.3987.87 Denial Of Service By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 15:56:15 GMT Google Chrome version 80.0.3987.87 heap-corruption remote denial of service proof of concept exploit. Full Article
science and technology Odin Secure FTP Expert 7.6.3 Site Info Denial Of Service By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 10:02:22 GMT Odin Secure FTP Expert version 7.6.3 Site Info denial of service proof of concept exploit. Full Article
science and technology FlashFXP 4.2.0 Build 1730 Denial Of Service By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:32:44 GMT FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit. Full Article
science and technology DiskBoss 7.7.14 Local Buffer Overflow By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:35:49 GMT DiskBoss version 7.7.14 Input Directory local buffer overflow proof of concept exploit. Full Article
science and technology Nsauditor 3.2.0.0 Denial Of Service By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 10:11:11 GMT Nsauditor version 3.2.0.0 denial of service proof of concept exploit. Full Article
science and technology Product Key Explorer 4.2.2.0 Denial Of Service By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 17:22:22 GMT Product Key Explorer version 4.2.2.0 Key denial of service proof of concept exploit. Full Article
science and technology Frigate 3.3.6 Denial Of Service By packetstormsecurity.com Published On :: Sun, 05 Apr 2020 18:22:22 GMT Frigate version 3.3.6 denial of service proof of concept exploit. Full Article
science and technology UltraVNC Launcher 1.2.4.0 Denial Of Service By packetstormsecurity.com Published On :: Sun, 05 Apr 2020 19:22:22 GMT UltraVNC Launcher version 1.2.4.0 Password denial of service proof of concept exploit. Full Article
science and technology UltraVNC Viewer 1.2.4.0 Denial Of Service By packetstormsecurity.com Published On :: Sun, 05 Apr 2020 22:22:22 GMT UltraVNC Viewer version 1.2.4.0 VNCServer denial of service proof of concept exploit. Full Article
science and technology UltraVNC Launcher 1.2.4.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:19:58 GMT UltraVNC Launcher version 1.2.4.0 RepeaterHost denial of service proof of concept exploit. Full Article
science and technology SpotAuditor 5.3.4 Denial Of Service By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:24:36 GMT SpotAuditor version 5.3.4 Name denial of service proof of concept exploit. Full Article
science and technology ZOC Terminal 7.25.5 Denial Of Service By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:28:10 GMT ZOC Terminal version 7.25.5 denial of service proof of concept exploit. Full Article
science and technology dnsmasq-utils 2.79-1 Denial Of Service By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:37:01 GMT dnsmasq-utils version 2.79-1 dhcp_release denial of service proof of concept exploit. Full Article
science and technology ZOC Terminal 7.25.5 Denial Of Service By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:38:18 GMT ZOC Terminal version 7.25.5 Script denial of service proof of concept exploit. Full Article
science and technology Amcrest Dahua NVR Camera IP2M-841 Denial Of Service By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:48:06 GMT Amcrest Dahua NVR Camera IP2M-841 denial of service proof of concept exploit. Full Article
science and technology CloudMe 1.11.2 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 22:01:11 GMT CloudMe version 1.11.2 buffer overflow proof of concept exploit. Original vulnerability discovered by hyp3rlinx. Full Article
science and technology Instagram Asks Researchers To Check Out Checkout Feature By packetstormsecurity.com Published On :: Wed, 21 Aug 2019 19:31:51 GMT Full Article headline hacker facebook social
science and technology Facebook's Libra Falls Into Big Gap In EU Rules By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 13:39:29 GMT Full Article headline government bank cybercrime fraud facebook social cryptography
science and technology Facebook Suspends Tens Of Thousands Of Apps Over Privacy Issues By packetstormsecurity.com Published On :: Mon, 23 Sep 2019 16:52:46 GMT Full Article headline privacy facebook social
science and technology AG Barr Asks Facebook To Not Use End To End Encryption By packetstormsecurity.com Published On :: Fri, 04 Oct 2019 13:47:34 GMT Full Article headline government privacy usa spyware facebook social cryptography
science and technology Cozy Bear Is Back In Action Again By packetstormsecurity.com Published On :: Thu, 17 Oct 2019 14:06:50 GMT Full Article headline government usa russia fraud cyberwar facebook social
science and technology How The Wheels Came Off Facebook's Libra Project By packetstormsecurity.com Published On :: Fri, 18 Oct 2019 14:59:55 GMT Full Article headline government bank facebook social cryptography
science and technology Two Plead Guilty In Conspiracy Involving Uber, LinkedIn, Others By packetstormsecurity.com Published On :: Thu, 31 Oct 2019 14:20:28 GMT Full Article headline hacker privacy cybercrime data loss fraud social uber
science and technology System Bug Gives Facebook Access To iPhone Cameras By packetstormsecurity.com Published On :: Wed, 13 Nov 2019 17:01:40 GMT Full Article headline privacy phone flaw apple facebook social
science and technology Amnesty Slams Facebook, Google Over Business Models By packetstormsecurity.com Published On :: Thu, 21 Nov 2019 15:02:04 GMT Full Article headline privacy data loss google spyware facebook social