k

Unpatched Kernel-Level Vuln Affects All Windows Versions




k

Linux Kernel Purged Of Five-Year-Old Root Access Bug




k

Die-Hard Bug Bytes Linux Kernel For Second Time










k

China Locks Down 35M People Over Coronavirus Case














k

Advantech WebAccess 7.2 Stack-Based Buffer Overflow

Core Security Technologies Advisory - Advantech WebAccess version 7.2 is vulnerable to a stack-based buffer overflow attack, which can be exploited by remote attackers to execute arbitrary code, by providing a malicious html file with specific parameters for an ActiveX component.




k

TRENDnet SecurView Wireless Network Camera TV-IP422WN Buffer Overflow

The TRENDnet UltraCam ActiveX Control UltraCamX.ocx suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions TV-IP422WN and TV-IP422W are affected.




k

IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow

The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522.




k

IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow

The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452.




k

1 Click Extract Audio 2.3.6 Buffer Overflow

1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability.




k

1 Click Audio Converter 2.3.6 Buffer Overflow

1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability.




k

Kguard Digital Video Recorder Bypass Issues

A deficiency in handling authentication and authorization has been found with Kguard 104/108/v2 models. While password-based authentication is used by the ActiveX component to protect the login page, all the communication to the application server at port 9000 allows data to be communicated directly with insufficient or improper authorization. Proof of concept exploit included.




k

LEADTOOLS Active-X DLL Hijacking

LEADTOOLS Active-X control suffers from multiple DLL side loading vulnerabilities.




k

Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow

Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability.




k

DiskBoss 7.7.14 Local Buffer Overflow

DiskBoss version 7.7.14 Input Directory local buffer overflow proof of concept exploit.




k

Product Key Explorer 4.2.2.0 Denial Of Service

Product Key Explorer version 4.2.2.0 Key denial of service proof of concept exploit.


















k

Linux sock_sendpage() NULL Pointer Dereference

Linux 2.4 and 2.6 kernel sock_sendpage() NULL pointer dereference exploit. The third and final version of this exploit. This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission.




k

Linux Kernel Sendpage Local Privilege Escalation

The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4





k

Norweigian Oil And Defense Industries Are Hit By A Major Cyber Attack