co

Controlling The Kernel - Its All About DRM





co

Die-Hard Bug Bytes Linux Kernel For Second Time




co

China Locks Down 35M People Over Coronavirus Case









co

Adobe Flash Player Type Confusion Remote Code Execution

This Metasploit module exploits a type confusion vulnerability found in the ActiveX component of Adobe Flash Player. This vulnerability was found exploited in the wild in November 2013. This Metasploit module has been tested successfully on IE 6 to IE 10 with Flash 11.7, 11.8 and 11.9 prior to 11.9.900.170 over Windows XP SP3 and Windows 7 SP1.




co

Adobe Flash Player Integer Underflow Remote Code Execution

This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an integer underflow in several avm2 instructions, which can be turned into remote code execution under the context of the user, as exploited in the wild in February 2014. This Metasploit module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes rop chains for several Flash 11 versions, as exploited in the wild.




co

AoA MP4 Converter 4.1.2 Active-X Overflow

AoA MP4 Converter version 4.1.2 suffers from an overflow vulnerability.




co

Advantech WebAccess dvs.ocx GetColor Buffer Overflow

This Metasploit module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This Metasploit module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9.




co

X360 VideoPlayer ActiveX Control Buffer Overflow

This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code.




co

1 Click Audio Converter 2.3.6 Buffer Overflow

1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability.




co

Kguard Digital Video Recorder Bypass Issues

A deficiency in handling authentication and authorization has been found with Kguard 104/108/v2 models. While password-based authentication is used by the ActiveX component to protect the login page, all the communication to the application server at port 9000 allows data to be communicated directly with insufficient or improper authorization. Proof of concept exploit included.




co

Advantech WebAccess 8.0 / 3.4.3 Code Execution

Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX.




co

UCanCode Remote Code Execution / Denial Of Service

UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks.




co

BarcodeWiz ActiveX Control Buffer Overflow

BarcodeWiz ActiveX Control versions prior to 6.7 suffers from a buffer overflow vulnerability.




co

Adobe Flash Active-X 28.0.0.137 Remote Code Execution

Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit.









co

connect-core5.c

Linux/ppc shellcode which connects /bin/sh to a host. connect-core5.s is appended.




co

execve-core.c

execve /bin/sh shellcode for Linux PPC. execve-core.s is appended.




co

readnexecppc-core.c

read(0,stack,1028); stack(); shellcode for Linux PPC. readnexecppc-core.s appended.




co

execMacOSX.txt

execve("/bin/sh",{"/bin/sh",NULL},NULL) shellcode for Mac OSX on both the PPC and x86 platforms.












co

42: The Answer To Life, The Universe, And How Many Cisco Products Have Struts Bugs





co

Apache Hadoop Spins Cracking Code Injection Vulnerability YARN




co

Contest Seeks The Most Diminutive XSS Worm




co

Facebook Vulnerable To Critical XSS, Could Lead To Malware Attacks




co

RubyOnRails XSS Vulnerability Claims Twitter, Basecamp And My Confidence





co

macOS Kernel wait_for_namespace_event() Race Condition / Use-After-Free

In the macOS kernel, the XNU function wait_for_namespace_event() in bsd/vfs/vfs_syscalls.c releases a file descriptor for use by userspace but may then subsequently destroy that file descriptor using fp_free(), which unconditionally frees the fileproc and fileglob. This opens up a race window during which the process could manipulate those objects while they're being freed. Exploitation requires root privileges.