2 Lockdown 2.0: এপ্রিলের ২০ তারিখ থেকে খুলে যেতে চলেছে এই সমস্ত সংস্থা By bengali.news18.com Published On :: Full Article
2 Lockdown 2.0- ২০ এপ্রিল থেকে ফের চালু হতে চলেছে দেশের ৪৫ শতাংশ অর্থব্যবস্থা By bengali.news18.com Published On :: Full Article
2 LIC-র সেরা পলিসি! বছরে ২৭ হাজার টাকা জমা করলে মিলবে ১০ লক্ষ টাকা... By bengali.news18.com Published On :: Full Article
2 ২ ঘণ্টার মধ্যে পেয়ে যাবেন করোনার বিমা ক্লেম, নির্দেশিকা জারি সরকারের By bengali.news18.com Published On :: Full Article
2 Lockdown| আর্থিক মন্দা! একলাফে কর্মীদের ২৫ শতাংশ বেতন ছেঁটে দিল দেশের এই নামী সংস্থা By bengali.news18.com Published On :: Full Article
2 মালামাল হওয়ার সুবর্ণ সুযোগ ! ১০ গ্রাম সোনার দাম ৫২ হাজার ছোঁয়ার সম্ভাবনা By bengali.news18.com Published On :: Full Article
2 যাত্রা বন্ধ অনেকদিন! ব্রিটিশ এয়ারওয়েজে ১২ হাজার চাকরি সংকোচনের আশঙ্কা By bengali.news18.com Published On :: Full Article
2 RIL Q4: জিও-র নিট মুনাফা ২৩৩১ কোটি টাকা, বৃদ্ধি ৭৩ শতাংশ By bengali.news18.com Published On :: Full Article
2 এখানে ২৭ টাকা পর্যন্ত সস্তা হয়েছে পেট্রোল-ডিজেল ! By bengali.news18.com Published On :: Full Article
2 News18 Urdu: Latest News North 24 Parganas By urdu.news18.com Published On :: visit News18 Urdu for latest news, breaking news, news headlines and updates from North 24 Parganas on politics, sports, entertainment, cricket, crime and more. Full Article
2 بڑی کمپنی میں کام کرتی تھی لڑکی، جی بی روڈ پر بیچ دیا، روز 15 سے 20 آدمی کرتے تھے ریپ By urdu.news18.com Published On :: Saturday, August 10, 2019 01:25 PM خاتون کا کہنا ہے کہ روز 15 سے 20 آدمی اس کا ریپ کرتے تھے۔ 27 سال کی خاتون مغربی بنگال کی رہنے والی ہے۔ آج تک کے مطابق وہ کولکاتہ میں ایک بڑی کمپنی میں کام کررہی تھی لیکن اور بہتر نوکری کے نام پر اسے ایک آدمی دہلی لیکرآیا اور پھر اسے جبراً جی بی روڈ بھیج دیا گیا۔ Full Article
2 Man Plans To Fix Up Phone Booth After Finding Bottle In Ocean With Reward From 2600 Magazine By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 14:59:52 GMT Full Article headline hacker scotland
2 Five Years Later, Italian Police Identify Hacker Behind 2013 NASA Hacks By packetstormsecurity.com Published On :: Wed, 10 Oct 2018 15:45:54 GMT Full Article headline hacker usa data loss italy nasa
2 Linux Kernel v2.4 Released By packetstormsecurity.com Published On :: Fri, 05 Jan 2001 12:28:39 GMT Full Article linux kernel
2 Linux Kernel 2.2/2.4 Local Root Ptrace Vulnerability By packetstormsecurity.com Published On :: Mon, 17 Mar 2003 14:20:12 GMT Full Article linux kernel
2 AoA DVD Creator 2.6.2 Active-X Overflow By packetstormsecurity.com Published On :: Tue, 20 May 2014 00:11:11 GMT AoA DVD Creator version 2.6.2 suffers from an overflow vulnerability. Full Article
2 AoA Audio Extractor 2.3.7 Active-X Overflow By packetstormsecurity.com Published On :: Tue, 20 May 2014 00:21:11 GMT AoA Audio Extractor Basic version 2.3.7 suffers from an overflow vulnerability. Full Article
2 AoA MP4 Converter 4.1.2 Active-X Overflow By packetstormsecurity.com Published On :: Tue, 20 May 2014 00:33:33 GMT AoA MP4 Converter version 4.1.2 suffers from an overflow vulnerability. Full Article
2 Advantech WebAccess 7.2 Stack-Based Buffer Overflow By packetstormsecurity.com Published On :: Thu, 20 Nov 2014 16:34:36 GMT Core Security Technologies Advisory - Advantech WebAccess version 7.2 is vulnerable to a stack-based buffer overflow attack, which can be exploited by remote attackers to execute arbitrary code, by providing a malicious html file with specific parameters for an ActiveX component. Full Article
2 TRENDnet SecurView Wireless Network Camera TV-IP422WN Buffer Overflow By packetstormsecurity.com Published On :: Tue, 25 Nov 2014 15:45:15 GMT The TRENDnet UltraCam ActiveX Control UltraCamX.ocx suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions TV-IP422WN and TV-IP422W are affected. Full Article
2 IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow By packetstormsecurity.com Published On :: Tue, 02 Dec 2014 01:33:52 GMT The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522. Full Article
2 IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow By packetstormsecurity.com Published On :: Tue, 02 Dec 2014 01:36:36 GMT The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452. Full Article
2 1 Click Extract Audio 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:04:44 GMT 1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
2 1 Click Audio Converter 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:55:55 GMT 1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
2 G DATA TOTAL SECURITY 25.4.0.3 Active-X Buffer Overflow By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 16:14:16 GMT G DATA TOTAL SECURITY version 25.4.0.3 suffers from an active-x buffer overflow vulnerability. Full Article
2 Adobe Flash Active-X 28.0.0.137 Remote Code Execution By packetstormsecurity.com Published On :: Mon, 24 Dec 2018 04:44:44 GMT Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit. Full Article
2 Ubuntu Security Notice USN-4058-2 By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:47:57 GMT Ubuntu Security Notice 4058-2 - USN-4058-1 fixed a vulnerability in bash. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bash incorrectly handled the restricted shell. An attacker could possibly use this issue to escape restrictions and execute any command. Various other issues were also addressed. Full Article
2 Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:25:29 GMT This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account. Full Article
2 FlashFXP 4.2.0 Build 1730 Denial Of Service By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:32:44 GMT FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit. Full Article
2 Nsauditor 3.2.0.0 Denial Of Service By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 10:11:11 GMT Nsauditor version 3.2.0.0 denial of service proof of concept exploit. Full Article
2 Product Key Explorer 4.2.2.0 Denial Of Service By packetstormsecurity.com Published On :: Sat, 04 Apr 2020 17:22:22 GMT Product Key Explorer version 4.2.2.0 Key denial of service proof of concept exploit. Full Article
2 UltraVNC Launcher 1.2.4.0 Denial Of Service By packetstormsecurity.com Published On :: Sun, 05 Apr 2020 19:22:22 GMT UltraVNC Launcher version 1.2.4.0 Password denial of service proof of concept exploit. Full Article
2 UltraVNC Viewer 1.2.4.0 Denial Of Service By packetstormsecurity.com Published On :: Sun, 05 Apr 2020 22:22:22 GMT UltraVNC Viewer version 1.2.4.0 VNCServer denial of service proof of concept exploit. Full Article
2 UltraVNC Launcher 1.2.4.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:19:58 GMT UltraVNC Launcher version 1.2.4.0 RepeaterHost denial of service proof of concept exploit. Full Article
2 ZOC Terminal 7.25.5 Denial Of Service By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:28:10 GMT ZOC Terminal version 7.25.5 denial of service proof of concept exploit. Full Article
2 dnsmasq-utils 2.79-1 Denial Of Service By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:37:01 GMT dnsmasq-utils version 2.79-1 dhcp_release denial of service proof of concept exploit. Full Article
2 ZOC Terminal 7.25.5 Denial Of Service By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:38:18 GMT ZOC Terminal version 7.25.5 Script denial of service proof of concept exploit. Full Article
2 Amcrest Dahua NVR Camera IP2M-841 Denial Of Service By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:48:06 GMT Amcrest Dahua NVR Camera IP2M-841 denial of service proof of concept exploit. Full Article
2 CloudMe 1.11.2 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 22:01:11 GMT CloudMe version 1.11.2 buffer overflow proof of concept exploit. Original vulnerability discovered by hyp3rlinx. Full Article
2 FailureToLaunch-2.pl.txt By packetstormsecurity.com Published On :: Sun, 02 Jul 2006 08:20:27 GMT Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function. PPC version. Full Article
2 FBI Arrests 24 In Card Fraud Takedown By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 14:21:28 GMT Full Article headline bank usa britain cybercrime germany fbi norway
2 Another File Integrity Checker 2.13-1 By packetstormsecurity.com Published On :: Wed, 21 Jan 2009 01:47:16 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
2 iWatch Filesystem Monitor 0.2.2 By packetstormsecurity.com Published On :: Wed, 18 Nov 2009 14:01:05 GMT iWatch is a real-time filesystem monitoring program. It is a tool for detecting any changes on your filesystem and reporting it to the system administrator immediately. It uses a simple configuration file in XML format and is based on inotify, a file change notification system in the Linux kernel. Full Article
2 Another File Integrity Checker 2.15 By packetstormsecurity.com Published On :: Sat, 24 Apr 2010 02:44:33 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
2 Another File Integrity Checker 2.16 By packetstormsecurity.com Published On :: Wed, 15 Dec 2010 11:07:22 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
2 Another File Integrity Checker 2.17 By packetstormsecurity.com Published On :: Fri, 10 Jun 2011 21:53:34 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
2 Another File Integrity Checker 2.18 By packetstormsecurity.com Published On :: Tue, 11 Oct 2011 01:59:54 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
2 Another File Integrity Checker 2.19 By packetstormsecurity.com Published On :: Wed, 16 Nov 2011 04:08:37 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
2 Another File Integrity Checker 2.20 By packetstormsecurity.com Published On :: Tue, 07 Feb 2012 23:12:30 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article