x

Security Flaws Force Linux Kernel Upgrade




x

Vista Kernel Fix Worse Than Useless





x

Remote Buffer Overflow Bug Bites Linux Kernel




x

Clever New Attack Exploits Fully-Patched Linux Kernel




x

Linux Devs Exterminate Security Bugs From Kernel




x

Linux Kernel Purged Of Five-Year-Old Root Access Bug




x

Die-Hard Bug Bytes Linux Kernel For Second Time












x

Adobe Flash Player Type Confusion Remote Code Execution

This Metasploit module exploits a type confusion vulnerability found in the ActiveX component of Adobe Flash Player. This vulnerability was found exploited in the wild in November 2013. This Metasploit module has been tested successfully on IE 6 to IE 10 with Flash 11.7, 11.8 and 11.9 prior to 11.9.900.170 over Windows XP SP3 and Windows 7 SP1.




x

Adobe Flash Player Integer Underflow Remote Code Execution

This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an integer underflow in several avm2 instructions, which can be turned into remote code execution under the context of the user, as exploited in the wild in February 2014. This Metasploit module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes rop chains for several Flash 11 versions, as exploited in the wild.




x

AoA DVD Creator 2.6.2 Active-X Overflow

AoA DVD Creator version 2.6.2 suffers from an overflow vulnerability.




x

AoA Audio Extractor 2.3.7 Active-X Overflow

AoA Audio Extractor Basic version 2.3.7 suffers from an overflow vulnerability.




x

AoA MP4 Converter 4.1.2 Active-X Overflow

AoA MP4 Converter version 4.1.2 suffers from an overflow vulnerability.




x

Advantech WebAccess dvs.ocx GetColor Buffer Overflow

This Metasploit module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This Metasploit module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9.




x

IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow

The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522.




x

IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow

The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452.




x

X360 VideoPlayer ActiveX Control Buffer Overflow

This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code.




x

1 Click Extract Audio 2.3.6 Buffer Overflow

1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability.




x

Tango DropBox 3.1.5 Active-X Heap Spray

Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO.




x

Tango FTP 1.0 Active-X Heap Spray

Tango FTP active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects version 1.0 build 136.




x

Advantech WebAccess 8.0 / 3.4.3 Code Execution

Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX.




x

LEADTOOLS Active-X DLL Hijacking

LEADTOOLS Active-X control suffers from multiple DLL side loading vulnerabilities.




x

Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow

Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability.




x

UCanCode Remote Code Execution / Denial Of Service

UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks.




x

Avaya IP Office (IPO) 10.1 Active-X Buffer Overflow

Avaya IP Office (IPO) versions 9.1.0 through 10.1 suffer from an active-x buffer overflow vulnerability.




x

BarcodeWiz ActiveX Control Buffer Overflow

BarcodeWiz ActiveX Control versions prior to 6.7 suffers from a buffer overflow vulnerability.




x

Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues

scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities.




x

G DATA TOTAL SECURITY 25.4.0.3 Active-X Buffer Overflow

G DATA TOTAL SECURITY version 25.4.0.3 suffers from an active-x buffer overflow vulnerability.




x

Adobe Flash Active-X 28.0.0.137 Remote Code Execution

Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit.




x

Odin Secure FTP Expert 7.6.3 Site Info Denial Of Service

Odin Secure FTP Expert version 7.6.3 Site Info denial of service proof of concept exploit.




x

FlashFXP 4.2.0 Build 1730 Denial Of Service

FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit.




x

Product Key Explorer 4.2.2.0 Denial Of Service

Product Key Explorer version 4.2.2.0 Key denial of service proof of concept exploit.





x

execve-core.c

execve /bin/sh shellcode for Linux PPC. execve-core.s is appended.




x

readnexecppc-core.c

read(0,stack,1028); stack(); shellcode for Linux PPC. readnexecppc-core.s appended.




x

execMacOSX.txt

execve("/bin/sh",{"/bin/sh",NULL},NULL) shellcode for Mac OSX on both the PPC and x86 platforms.




x

FailureToLaunch-2.pl.txt

Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function. PPC version.




x

getpwnedmail-ppc.pl.txt

Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the PPC architecture.




x

VLCMediaSlayer-ppc.pl.txt

Month Of Apple Bugs - A vulnerability in the handling of the udp:// URL handler for the VLC Media Player allows remote arbitrary code execution. This is just a vanilla format string exploit for OSX on ppc.




x

ppc-rfi.txt

ppc engine suffers from a remote file inclusion flaw.




x

Trafscrambler Anti-Sniffer For OS X

Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. This initial release implements SYN-decoy, Pre/Post connections SYN, TCP reset, and zero window attacks. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well.