tac

Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow

This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista.




tac

Microsoft Windows OpenType CFF Driver Stack Overflow

The VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Windows. The vulnerability is caused by a stack overflow error in the OpenType Compact Font Format (CFF) driver "ATMFD.dll" when processing certain operands within an OpenType font, which could be exploited by remote attackers to execute arbitrary code on a vulnerable Windows 7, Windows Server 2008, Windows Server 2008 R2, and Windows Vista systems via a malicious font, or by local attackers to gain elevated privileges on Windows XP and Windows Server 2003 systems via a malicious application.




tac

CCMPlayer 1.5 Stack Buffer Overflow

This Metasploit module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening a m3u playlist with a long track name, a SEH exception record can be overwritten with parts of the controllable buffer. SEH execution is triggered after an invalid read of an injectable address, thus allowing arbitrary code execution. This Metasploit module works on multiple Windows platforms including: Windows XP SP3, Windows Vista, and Windows 7.





tac

Turkish Hackers Attack CDU Websites





tac

Linux's systemd Vulnerable To DNS Server Attack




tac

Practical Attacks With DNS Rebinding




tac

Unprecedented DNS Hijacking Attacks Linked To Iran






tac

New Attack On Home Routers Sends Users To Spoofed Sites That Push Malware




tac

Brutus FTP Attack Tool 0.3

Brutus is a small threaded python FTP brute-force and dictionary attack tool. It supports several brute-force parameters such as a custom character sets, password length, minimum password length, prefix, and postfix strings to passwords generated.




tac

RSA Factorization Attack Using Fermat's Algorithm

Script that performs RSA factorization attack using Fermat's algorithm.










tac

Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow

Delta Industrial Automation DCISoft version 1.12.09 suffers from a stack buffer overflow vulnerability.




tac

At Least 77 Killed In Nice, France Terror Attack




tac

Air Contacts Lite Denial Of Service

The Air Contacts Lite iPhone / iPod application suffers from a denial of service vulnerability.











tac

Pytacle Alpha2

pytacle is a tool inspired by tentacle. It automates the task of sniffing GSM frames of the air, extracting the key exchange, feeding kraken with the key material and finally decode/decrypt the voice data. All You need is a USRP (or similar) to capture the GSM band and a kraken instance with the berlin tables (only about 2TB).








tac

Iranian Internet Attacked Saturday, Knocked Partially Offline





tac

4G Networks Vulnerable To DoS Attacks, Subscriber Tracking








tac

New SSH Attack Weakens Passwords




tac

Admins Warned Of Brute-Force SSH Attacks




tac

SSH Sniffer Attack Poses Minor Risk




tac

Brute Force SSH Attack Confounds Defenders




tac

SSH Server Attacks Resurface




tac

Server-Based Botnet Floods Net With Brutish SSH Attacks