3 'Kernel Memory Leaking' Intel Design Flaw Forces Linux, Windows Redesign By packetstormsecurity.com Published On :: Wed, 03 Jan 2018 04:34:20 GMT Full Article headline microsoft linux flaw kernel intel
3 China Locks Down 35M People Over Coronavirus Case By packetstormsecurity.com Published On :: Sat, 25 Jan 2020 16:59:40 GMT Full Article headline virus china
3 Coronavirus Brings China's Surveillance State Out Of The Shadows By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 13:39:20 GMT Full Article headline government privacy virus china
3 Afghanistan's Karzai Slams United States Over Massacre By packetstormsecurity.com Published On :: Fri, 16 Mar 2012 16:06:55 GMT Full Article headline government usa afghanistan
3 AoA Audio Extractor 2.3.7 Active-X Overflow By packetstormsecurity.com Published On :: Tue, 20 May 2014 00:21:11 GMT AoA Audio Extractor Basic version 2.3.7 suffers from an overflow vulnerability. Full Article
3 IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow By packetstormsecurity.com Published On :: Tue, 02 Dec 2014 01:33:52 GMT The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522. Full Article
3 IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow By packetstormsecurity.com Published On :: Tue, 02 Dec 2014 01:36:36 GMT The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452. Full Article
3 X360 VideoPlayer ActiveX Control Buffer Overflow By packetstormsecurity.com Published On :: Tue, 17 Feb 2015 18:25:40 GMT This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code. Full Article
3 1 Click Extract Audio 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:04:44 GMT 1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
3 1 Click Audio Converter 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:55:55 GMT 1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
3 Tango DropBox 3.1.5 Active-X Heap Spray By packetstormsecurity.com Published On :: Fri, 19 Jun 2015 15:39:30 GMT Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO. Full Article
3 Advantech WebAccess 8.0 / 3.4.3 Code Execution By packetstormsecurity.com Published On :: Mon, 07 Sep 2015 14:33:33 GMT Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX. Full Article
3 Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 31 Oct 2016 06:22:22 GMT Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability. Full Article
3 G DATA TOTAL SECURITY 25.4.0.3 Active-X Buffer Overflow By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 16:14:16 GMT G DATA TOTAL SECURITY version 25.4.0.3 suffers from an active-x buffer overflow vulnerability. Full Article
3 Adobe Flash Active-X 28.0.0.137 Remote Code Execution By packetstormsecurity.com Published On :: Mon, 24 Dec 2018 04:44:44 GMT Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit. Full Article
3 Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:25:29 GMT This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account. Full Article
3 Google Chrome 80.0.3987.87 Denial Of Service By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 15:56:15 GMT Google Chrome version 80.0.3987.87 heap-corruption remote denial of service proof of concept exploit. Full Article
3 Odin Secure FTP Expert 7.6.3 Site Info Denial Of Service By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 10:02:22 GMT Odin Secure FTP Expert version 7.6.3 Site Info denial of service proof of concept exploit. Full Article
3 FlashFXP 4.2.0 Build 1730 Denial Of Service By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:32:44 GMT FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit. Full Article
3 Nsauditor 3.2.0.0 Denial Of Service By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 10:11:11 GMT Nsauditor version 3.2.0.0 denial of service proof of concept exploit. Full Article
3 Frigate 3.3.6 Denial Of Service By packetstormsecurity.com Published On :: Sun, 05 Apr 2020 18:22:22 GMT Frigate version 3.3.6 denial of service proof of concept exploit. Full Article
3 SpotAuditor 5.3.4 Denial Of Service By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:24:36 GMT SpotAuditor version 5.3.4 Name denial of service proof of concept exploit. Full Article
3 Facebook's Libra Falls Into Big Gap In EU Rules By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 13:39:29 GMT Full Article headline government bank cybercrime fraud facebook social cryptography
3 How The Wheels Came Off Facebook's Libra Project By packetstormsecurity.com Published On :: Fri, 18 Oct 2019 14:59:55 GMT Full Article headline government bank facebook social cryptography
3 MIT And CERN's Secure Webmail Plan Stumped By PayPal Freeze By packetstormsecurity.com Published On :: Tue, 01 Jul 2014 06:38:49 GMT Full Article headline email bank cybercrime fraud paypal switzerland
3 Snowden Shouldn't Be Extradited To US If He Testifies About NSA Spying, Says Swiss Gov By packetstormsecurity.com Published On :: Mon, 08 Sep 2014 21:28:14 GMT Full Article headline government usa cyberwar spyware switzerland
3 Secunia Security Advisory 48336 By packetstormsecurity.com Published On :: Mon, 12 Mar 2012 10:10:02 GMT Secunia Security Advisory - A vulnerability has been reported in Inout PPC Engine, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Article
3 Were Oslo's Terror Blasts Caused By Car Bombs? By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 21:16:02 GMT Full Article headline terror norway
3 Police Say Oslo Suspect Admits To 'Facts' In Massacre By packetstormsecurity.com Published On :: Sun, 24 Jul 2011 15:52:52 GMT Full Article headline terror norway
3 Hacker Site's Incriminating Database Published Online By Rivals By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:24 GMT Full Article headline hacker privacy database data loss cyberwar
3 Light In The Box Bared 1.3 TB Of Server Logs, User Data By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:37:02 GMT Full Article headline privacy database china data loss
3 Another File Integrity Checker 2.13-1 By packetstormsecurity.com Published On :: Wed, 21 Jan 2009 01:47:16 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
3 Rootkit Hunter 1.3.6 By packetstormsecurity.com Published On :: Mon, 30 Nov 2009 22:01:27 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
3 Rootkit Hunter 1.3.8 By packetstormsecurity.com Published On :: Thu, 18 Nov 2010 00:42:04 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
3 Malmon Detection Tool 0.3 By packetstormsecurity.com Published On :: Wed, 02 Feb 2011 18:22:11 GMT Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory. Full Article
3 Another File Integrity Checker 3.1 By packetstormsecurity.com Published On :: Thu, 26 Jul 2012 01:36:53 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
3 Another File Integrity Checker 3.2 By packetstormsecurity.com Published On :: Wed, 14 Nov 2012 00:16:44 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
3 Another File Integrity Checker 3.3 By packetstormsecurity.com Published On :: Thu, 27 Dec 2012 16:38:21 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
3 Another File Integrity Checker 3.4 By packetstormsecurity.com Published On :: Tue, 10 Sep 2013 16:18:25 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
3 Apache Struts 2 Needs Patching, Without Delay. It's Under Attack Now. By packetstormsecurity.com Published On :: Thu, 09 Mar 2017 16:15:22 GMT Full Article headline hacker flaw apache
3 Scripting Bugs Blight Security Giants' Websites By packetstormsecurity.com Published On :: Fri, 13 Jun 2008 03:15:52 GMT Full Article xss
3 XSS Flaw Discovered In Skype's Shop, User Accounts Targeted By packetstormsecurity.com Published On :: Fri, 24 Feb 2012 23:57:20 GMT Full Article headline flaw identity theft skype social xss
3 FreeBSD Security Advisory - FreeBSD-SA-18:13.nfs By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 18:04:28 GMT FreeBSD Security Advisory - Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server. Full Article
3 FreeBSD Security Advisory - FreeBSD-SA-19:03.wpa By packetstormsecurity.com Published On :: Wed, 15 May 2019 15:30:08 GMT FreeBSD Security Advisory - Multiple vulnerabilities exist in the hostapd(8) and wpa_supplicant(8) implementations. Full Article
3 Kenya's Treasury Website Attacked By Hackers By packetstormsecurity.com Published On :: Thu, 06 Jan 2011 16:41:58 GMT Full Article headline hacker africa
3 Megaupload Sequel Faces Gabon's Suspension Order Setback By packetstormsecurity.com Published On :: Thu, 08 Nov 2012 00:49:22 GMT Full Article headline government usa africa riaa mpaa new zealand
3 3 Nigerians Get 235 Years For Online Scams By packetstormsecurity.com Published On :: Fri, 26 May 2017 13:19:22 GMT Full Article headline bank fraud africa scam
3 RSA Roundup: Oracle's Database Firewall, Juniper, Fortinet By packetstormsecurity.com Published On :: Mon, 14 Feb 2011 22:08:06 GMT Full Article headline oracle juniper conference
3 Juniper Resets 'Days Since Last Rogue Code Incident' Clock By packetstormsecurity.com Published On :: Mon, 11 Jan 2016 14:41:03 GMT Full Article headline flaw juniper backdoor
3 Juniper's Bug Hunters Fire Out Eight Patches By packetstormsecurity.com Published On :: Thu, 14 Jul 2016 14:30:52 GMT Full Article headline flaw patch juniper