en

TRENDnet SecurView Wireless Network Camera TV-IP422WN Buffer Overflow

The TRENDnet UltraCam ActiveX Control UltraCamX.ocx suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions TV-IP422WN and TV-IP422W are affected.




en

UCanCode Remote Code Execution / Denial Of Service

UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks.




en

Bash Profile Persistence

This Metasploit module writes an execution trigger to the target's Bash profile. The execution trigger executes a call back payload whenever the target user opens a Bash terminal. A handler is not run automatically, so you must configure an appropriate exploit/multi/handler to receive the callback.




en

Google Chrome 80.0.3987.87 Denial Of Service

Google Chrome version 80.0.3987.87 heap-corruption remote denial of service proof of concept exploit.




en

Odin Secure FTP Expert 7.6.3 Site Info Denial Of Service

Odin Secure FTP Expert version 7.6.3 Site Info denial of service proof of concept exploit.




en

FlashFXP 4.2.0 Build 1730 Denial Of Service

FlashFXP version 4.2.0 build 1730 denial of service proof of concept exploit.




en

Nsauditor 3.2.0.0 Denial Of Service

Nsauditor version 3.2.0.0 denial of service proof of concept exploit.




en

Product Key Explorer 4.2.2.0 Denial Of Service

Product Key Explorer version 4.2.2.0 Key denial of service proof of concept exploit.




en

Frigate 3.3.6 Denial Of Service

Frigate version 3.3.6 denial of service proof of concept exploit.




en

UltraVNC Launcher 1.2.4.0 Denial Of Service

UltraVNC Launcher version 1.2.4.0 Password denial of service proof of concept exploit.




en

UltraVNC Viewer 1.2.4.0 Denial Of Service

UltraVNC Viewer version 1.2.4.0 VNCServer denial of service proof of concept exploit.




en

UltraVNC Launcher 1.2.4.0 Denial Of Service

UltraVNC Launcher version 1.2.4.0 RepeaterHost denial of service proof of concept exploit.




en

SpotAuditor 5.3.4 Denial Of Service

SpotAuditor version 5.3.4 Name denial of service proof of concept exploit.




en

ZOC Terminal 7.25.5 Denial Of Service

ZOC Terminal version 7.25.5 denial of service proof of concept exploit.




en

dnsmasq-utils 2.79-1 Denial Of Service

dnsmasq-utils version 2.79-1 dhcp_release denial of service proof of concept exploit.




en

ZOC Terminal 7.25.5 Denial Of Service

ZOC Terminal version 7.25.5 Script denial of service proof of concept exploit.




en

Amcrest Dahua NVR Camera IP2M-841 Denial Of Service

Amcrest Dahua NVR Camera IP2M-841 denial of service proof of concept exploit.








en

envt.c

A simple program to inject linux shellcode into the environment and find its location in memory. It contains 8 shellcodes for x86, sparc, mips, and ppc.




en

Linux sock_sendpage() NULL Pointer Dereference

Linux 2.4 and 2.6 kernel sock_sendpage() NULL pointer dereference exploit. The third and final version of this exploit. This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission.




en

Inout PPC Engine Cross Site Request Forgery

Inout PPC Engine suffers from a cross site request forgery vulnerability.




en

Linux Kernel Sendpage Local Privilege Escalation

The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4




en

Norweigian Oil And Defense Industries Are Hit By A Major Cyber Attack







en

Apache ActiveMQ Flaws Leave Servers Open To DoS Attacks




en

Apache Vulnerabilities Spotted In OpenWhisk And Tomcat




en

Serious Apache Server Bug Gives Root To Baddies In Shared Environments




en

American Express Bitten By XSS Bugs Again




en

Attention Symantec - There Is A Bug Crawling On Your Website




en

XSS Flaws Poke Ridicule At Entertainment Industry




en

RubyOnRails XSS Vulnerability Claims Twitter, Basecamp And My Confidence




en

Anti-Virus Vendor Trio Plug Website Flaws





en

Linux / FreeBSD TCP-Based Denial Of Service

Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed _"SACK Panic_," allows a remotely-triggered kernel panic on recent Linux kernels. There are patches that address most of these vulnerabilities. If patches can not be applied, certain mitigations will be effective.




en

macOS Kernel wait_for_namespace_event() Race Condition / Use-After-Free

In the macOS kernel, the XNU function wait_for_namespace_event() in bsd/vfs/vfs_syscalls.c releases a file descriptor for use by userspace but may then subsequently destroy that file descriptor using fp_free(), which unconditionally frees the fileproc and fileglob. This opens up a race window during which the process could manipulate those objects while they're being freed. Exploitation requires root privileges.





en

Hackers Shut Down NDDC Website Over Presidential Inauguration








en

Ebola Outbreak Reaches City Of 1 Million Residents






en

Cisco And Juniper Clientless VPNs Expose Netizens