3

China Locks Down 35M People Over Coronavirus Case






3

AoA Audio Extractor 2.3.7 Active-X Overflow

AoA Audio Extractor Basic version 2.3.7 suffers from an overflow vulnerability.




3

IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow

The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522.




3

IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow

The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452.




3

X360 VideoPlayer ActiveX Control Buffer Overflow

This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code.




3

1 Click Extract Audio 2.3.6 Buffer Overflow

1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability.




3

1 Click Audio Converter 2.3.6 Buffer Overflow

1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability.




3

Tango DropBox 3.1.5 Active-X Heap Spray

Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO.




3

Advantech WebAccess 8.0 / 3.4.3 Code Execution

Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX.




3

Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow

Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability.




3

G DATA TOTAL SECURITY 25.4.0.3 Active-X Buffer Overflow

G DATA TOTAL SECURITY version 25.4.0.3 suffers from an active-x buffer overflow vulnerability.




3

Adobe Flash Active-X 28.0.0.137 Remote Code Execution

Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit.




3

Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write

This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account.




3

Google Chrome 80.0.3987.87 Denial Of Service

Google Chrome version 80.0.3987.87 heap-corruption remote denial of service proof of concept exploit.




3

Odin Secure FTP Expert 7.6.3 Site Info Denial Of Service

Odin Secure FTP Expert version 7.6.3 Site Info denial of service proof of concept exploit.




3

FlashFXP 4.2.0 Build 1730 Denial Of Service

FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit.




3

Nsauditor 3.2.0.0 Denial Of Service

Nsauditor version 3.2.0.0 denial of service proof of concept exploit.




3

Frigate 3.3.6 Denial Of Service

Frigate version 3.3.6 denial of service proof of concept exploit.




3

SpotAuditor 5.3.4 Denial Of Service

SpotAuditor version 5.3.4 Name denial of service proof of concept exploit.








3

Secunia Security Advisory 48336

Secunia Security Advisory - A vulnerability has been reported in Inout PPC Engine, which can be exploited by malicious people to conduct cross-site request forgery attacks.





3

Police Say Oslo Suspect Admits To 'Facts' In Massacre






3

Another File Integrity Checker 2.13-1

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




3

Rootkit Hunter 1.3.6

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.




3

Rootkit Hunter 1.3.8

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.




3

Malmon Detection Tool 0.3

Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory.




3

Another File Integrity Checker 3.1

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




3

Another File Integrity Checker 3.2

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




3

Another File Integrity Checker 3.3

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




3

Another File Integrity Checker 3.4

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




3

Apache Struts 2 Needs Patching, Without Delay. It's Under Attack Now.




3

Scripting Bugs Blight Security Giants' Websites





3

FreeBSD Security Advisory - FreeBSD-SA-18:13.nfs

FreeBSD Security Advisory - Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server.




3

FreeBSD Security Advisory - FreeBSD-SA-19:03.wpa

FreeBSD Security Advisory - Multiple vulnerabilities exist in the hostapd(8) and wpa_supplicant(8) implementations.