પ્રીટ્રેડીંગ સેશન: Sensexમાં 1300 પોઇન્ટનો તો Niftyમાં 380 પોઇન્ટનો ઉછાળો
EXCLUSIVE: 14 એપ્રિલ બાદ પ્રોડક્શન માટે 82 જિલ્લાઓમાં હટી શકે છે Lockdown
કેન્દ્ર સરકારનું માનવું છે કે, સ્કૂલ, કોલેજ, ધાર્મિક સ્થળો, મોલ, સિનેમા હોલ જેવી જગ્યાઓ 31 મે સુધી બંધ રાખી શકે છે. સરકાર એવા જિલ્લાઓની ફેક્ટરીઓ ખોલવાની મંજૂરી આપી શકે છે જ્યાં કોરોના વાયરસનો એકપણ કેસ નોંધાયો નથી.
Exclusive: "উপেন্দ্রকিশোর রায়চৌধুরির ভায়োলিন নিয়ে 'ঘরে বাইরে'র রেকর্ডিংয়ে গিয়েছিলাম"- দেবজ্যোতি মিশ্র
Exclusive: ‘গানের রেকর্ডিং করতে কলকাতায় যেতে পারব না’, সত্যজিৎ রায়কে চিঠিতে জানিয়ে ছিলেন কিশোরকুমার
Adobe Flash Player Type Confusion Remote Code Execution
This Metasploit module exploits a type confusion vulnerability found in the ActiveX component of Adobe Flash Player. This vulnerability was found exploited in the wild in November 2013. This Metasploit module has been tested successfully on IE 6 to IE 10 with Flash 11.7, 11.8 and 11.9 prior to 11.9.900.170 over Windows XP SP3 and Windows 7 SP1.
Adobe Flash Player Integer Underflow Remote Code Execution
This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an integer underflow in several avm2 instructions, which can be turned into remote code execution under the context of the user, as exploited in the wild in February 2014. This Metasploit module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes rop chains for several Flash 11 versions, as exploited in the wild.
AoA Audio Extractor 2.3.7 Active-X Overflow
X360 VideoPlayer ActiveX Control Buffer Overflow
This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code.
1 Click Extract Audio 2.3.6 Buffer Overflow
1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability.
Advantech WebAccess 8.0 / 3.4.3 Code Execution
Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX.
UCanCode Remote Code Execution / Denial Of Service
UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks.
BarcodeWiz ActiveX Control Buffer Overflow
BarcodeWiz ActiveX Control versions prior to 6.7 suffers from a buffer overflow vulnerability.
Adobe Flash Active-X 28.0.0.137 Remote Code Execution
Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit.
Odin Secure FTP Expert 7.6.3 Site Info Denial Of Service
Odin Secure FTP Expert version 7.6.3 Site Info denial of service proof of concept exploit.
Product Key Explorer 4.2.2.0 Denial Of Service
Snowden Shouldn't Be Extradited To US If He Testifies About NSA Spying, Says Swiss Gov
readnexecppc-core.c
execMacOSX.txt
execve("/bin/sh",{"/bin/sh",NULL},NULL) shellcode for Mac OSX on both the PPC and x86 platforms.
FreeBSD rtld execl() Privilege Escalation
This Metasploit module exploits a vulnerability in the FreeBSD run-time link-editor (rtld). The rtld unsetenv() function fails to remove LD_* environment variables if __findenv() fails. This can be abused to load arbitrary shared objects using LD_PRELOAD, resulting in privileged code execution.
Slackware Security Advisory - expat Updates
Slackware Security Advisory - New expat packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.