w

AoA MP4 Converter 4.1.2 Active-X Overflow

AoA MP4 Converter version 4.1.2 suffers from an overflow vulnerability.




w

Advantech WebAccess dvs.ocx GetColor Buffer Overflow

This Metasploit module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This Metasploit module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9.




w

Advantech WebAccess 7.2 Stack-Based Buffer Overflow

Core Security Technologies Advisory - Advantech WebAccess version 7.2 is vulnerable to a stack-based buffer overflow attack, which can be exploited by remote attackers to execute arbitrary code, by providing a malicious html file with specific parameters for an ActiveX component.




w

TRENDnet SecurView Wireless Network Camera TV-IP422WN Buffer Overflow

The TRENDnet UltraCam ActiveX Control UltraCamX.ocx suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions TV-IP422WN and TV-IP422W are affected.




w

IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow

The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522.




w

IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow

The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452.




w

X360 VideoPlayer ActiveX Control Buffer Overflow

This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code.




w

1 Click Extract Audio 2.3.6 Buffer Overflow

1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability.




w

1 Click Audio Converter 2.3.6 Buffer Overflow

1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability.




w

Advantech WebAccess 8.0 / 3.4.3 Code Execution

Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX.




w

Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow

Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability.




w

Avaya IP Office (IPO) 10.1 Active-X Buffer Overflow

Avaya IP Office (IPO) versions 9.1.0 through 10.1 suffer from an active-x buffer overflow vulnerability.




w

BarcodeWiz ActiveX Control Buffer Overflow

BarcodeWiz ActiveX Control versions prior to 6.7 suffers from a buffer overflow vulnerability.




w

Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues

scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities.




w

G DATA TOTAL SECURITY 25.4.0.3 Active-X Buffer Overflow

G DATA TOTAL SECURITY version 25.4.0.3 suffers from an active-x buffer overflow vulnerability.




w

Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write

This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account.




w

DiskBoss 7.7.14 Local Buffer Overflow

DiskBoss version 7.7.14 Input Directory local buffer overflow proof of concept exploit.




w

UltraVNC Viewer 1.2.4.0 Denial Of Service

UltraVNC Viewer version 1.2.4.0 VNCServer denial of service proof of concept exploit.




w

CloudMe 1.11.2 Buffer Overflow

CloudMe version 1.11.2 buffer overflow proof of concept exploit. Original vulnerability discovered by hyp3rlinx.
















w

getpwnedmail-ppc.pl.txt

Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the PPC architecture.







w

Norweigian Oil And Defense Industries Are Hit By A Major Cyber Attack




w

Soca Website Attack: Norway Arrests Two Youths






w

KeeWeb 1.14.0 HTML Injection

KeeWeb version 1.14.0 suffers from an html injection vulnerability.






w

iWatch Filesystem Monitor 0.2.2

iWatch is a real-time filesystem monitoring program. It is a tool for detecting any changes on your filesystem and reporting it to the system administrator immediately. It uses a simple configuration file in XML format and is based on inotify, a file change notification system in the Linux kernel.




w

Attack On Apache Server Exposes Firewalls, Routers, Etc






w

Apache ActiveMQ Flaws Leave Servers Open To DoS Attacks





w

Apache Struts 2 Needs Patching, Without Delay. It's Under Attack Now.