w AoA MP4 Converter 4.1.2 Active-X Overflow By packetstormsecurity.com Published On :: Tue, 20 May 2014 00:33:33 GMT AoA MP4 Converter version 4.1.2 suffers from an overflow vulnerability. Full Article
w Advantech WebAccess dvs.ocx GetColor Buffer Overflow By packetstormsecurity.com Published On :: Wed, 24 Sep 2014 16:20:35 GMT This Metasploit module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This Metasploit module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9. Full Article
w Advantech WebAccess 7.2 Stack-Based Buffer Overflow By packetstormsecurity.com Published On :: Thu, 20 Nov 2014 16:34:36 GMT Core Security Technologies Advisory - Advantech WebAccess version 7.2 is vulnerable to a stack-based buffer overflow attack, which can be exploited by remote attackers to execute arbitrary code, by providing a malicious html file with specific parameters for an ActiveX component. Full Article
w TRENDnet SecurView Wireless Network Camera TV-IP422WN Buffer Overflow By packetstormsecurity.com Published On :: Tue, 25 Nov 2014 15:45:15 GMT The TRENDnet UltraCam ActiveX Control UltraCamX.ocx suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions TV-IP422WN and TV-IP422W are affected. Full Article
w IPUX CS7522/CS2330/CS2030 IP Camera Stack Buffer Overflow By packetstormsecurity.com Published On :: Tue, 02 Dec 2014 01:33:52 GMT The UltraHVCam ActiveX Control 'UltraHVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraHVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include PT Type ICS2330, Cube Type ICS2030, and Dome Type ICS7522. Full Article
w IPUX CL5452/CL5132 IP Camera Stack Buffer Overflow By packetstormsecurity.com Published On :: Tue, 02 Dec 2014 01:36:36 GMT The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code. Versions affected include Bullet Type ICL5132 and Bullet Type ICL5452. Full Article
w X360 VideoPlayer ActiveX Control Buffer Overflow By packetstormsecurity.com Published On :: Tue, 17 Feb 2015 18:25:40 GMT This Metasploit module exploits a buffer overflow in the VideoPlayer.ocx ActiveX installed with the X360 Software. By setting an overly long value to 'ConvertFile()',an attacker can overrun a .data buffer to bypass ASLR/DEP and finally execute arbitrary code. Full Article
w 1 Click Extract Audio 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:04:44 GMT 1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
w 1 Click Audio Converter 2.3.6 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 05 Jun 2015 14:55:55 GMT 1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability. Full Article
w Advantech WebAccess 8.0 / 3.4.3 Code Execution By packetstormsecurity.com Published On :: Mon, 07 Sep 2015 14:33:33 GMT Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX. Full Article
w Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 31 Oct 2016 06:22:22 GMT Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability. Full Article
w Avaya IP Office (IPO) 10.1 Active-X Buffer Overflow By packetstormsecurity.com Published On :: Sun, 05 Nov 2017 15:40:54 GMT Avaya IP Office (IPO) versions 9.1.0 through 10.1 suffer from an active-x buffer overflow vulnerability. Full Article
w BarcodeWiz ActiveX Control Buffer Overflow By packetstormsecurity.com Published On :: Sat, 06 Jan 2018 18:33:30 GMT BarcodeWiz ActiveX Control versions prior to 6.7 suffers from a buffer overflow vulnerability. Full Article
w Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues By packetstormsecurity.com Published On :: Wed, 06 Jun 2018 20:22:22 GMT scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities. Full Article
w G DATA TOTAL SECURITY 25.4.0.3 Active-X Buffer Overflow By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 16:14:16 GMT G DATA TOTAL SECURITY version 25.4.0.3 suffers from an active-x buffer overflow vulnerability. Full Article
w Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:25:29 GMT This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account. Full Article
w DiskBoss 7.7.14 Local Buffer Overflow By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:35:49 GMT DiskBoss version 7.7.14 Input Directory local buffer overflow proof of concept exploit. Full Article
w UltraVNC Viewer 1.2.4.0 Denial Of Service By packetstormsecurity.com Published On :: Sun, 05 Apr 2020 22:22:22 GMT UltraVNC Viewer version 1.2.4.0 VNCServer denial of service proof of concept exploit. Full Article
w CloudMe 1.11.2 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 22:01:11 GMT CloudMe version 1.11.2 buffer overflow proof of concept exploit. Original vulnerability discovered by hyp3rlinx. Full Article
w How The Wheels Came Off Facebook's Libra Project By packetstormsecurity.com Published On :: Fri, 18 Oct 2019 14:59:55 GMT Full Article headline government bank facebook social cryptography
w Two Plead Guilty In Conspiracy Involving Uber, LinkedIn, Others By packetstormsecurity.com Published On :: Thu, 31 Oct 2019 14:20:28 GMT Full Article headline hacker privacy cybercrime data loss fraud social uber
w 15 Anonymous Suspects Arrested By Italian And Swiss Police By packetstormsecurity.com Published On :: Wed, 06 Jul 2011 14:27:49 GMT Full Article headline hacker italy anonymous switzerland
w Greek Journo Who Published List Of Swiss Bank Account Holders Cleared By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 15:15:41 GMT Full Article headline privacy bank data loss switzerland greece
w US And UK Spooks Alerted Over Massive Swiss Data Leak By packetstormsecurity.com Published On :: Wed, 05 Dec 2012 03:19:41 GMT Full Article headline government usa britain data loss switzerland
w Swiss Cloud To Hide Data From PRISM Spies By packetstormsecurity.com Published On :: Tue, 05 Nov 2013 00:45:59 GMT Full Article headline government usa spyware nsa switzerland
w Truecrypt Is Alive And Well And Living In Switzerland By packetstormsecurity.com Published On :: Tue, 03 Jun 2014 01:48:34 GMT Full Article headline privacy cryptography switzerland
w MIT And CERN's Secure Webmail Plan Stumped By PayPal Freeze By packetstormsecurity.com Published On :: Tue, 01 Jul 2014 06:38:49 GMT Full Article headline email bank cybercrime fraud paypal switzerland
w Attackers Raid Swiss Banks With DNS And Malware Bombs By packetstormsecurity.com Published On :: Wed, 23 Jul 2014 15:04:55 GMT Full Article headline malware bank dns cybercrime fraud switzerland
w Snowden Shouldn't Be Extradited To US If He Testifies About NSA Spying, Says Swiss Gov By packetstormsecurity.com Published On :: Mon, 08 Sep 2014 21:28:14 GMT Full Article headline government usa cyberwar spyware switzerland
w Swisscom Data Breach: 800,000 Customers Affected By packetstormsecurity.com Published On :: Thu, 08 Feb 2018 15:23:24 GMT Full Article headline privacy phone data loss switzerland
w Kaspersky Lab To Shift US Customer Data From Russia To Switzerland By packetstormsecurity.com Published On :: Tue, 15 May 2018 09:38:10 GMT Full Article headline privacy usa virus russia switzerland
w getpwnedmail-ppc.pl.txt By packetstormsecurity.com Published On :: Thu, 17 Aug 2006 07:34:43 GMT Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the PPC architecture. Full Article
w Were Oslo's Terror Blasts Caused By Car Bombs? By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 21:16:02 GMT Full Article headline terror norway
w Twin Terror Attacks Shock Norway By packetstormsecurity.com Published On :: Sat, 23 Jul 2011 01:58:41 GMT Full Article headline terror norway
w Anonymous Lashes Out At Norway Massacre Suspect By packetstormsecurity.com Published On :: Tue, 26 Jul 2011 04:32:40 GMT Full Article headline terror anonymous norway
w Norweigian Oil And Defense Industries Are Hit By A Major Cyber Attack By packetstormsecurity.com Published On :: Fri, 18 Nov 2011 16:43:19 GMT Full Article headline cyberwar norway
w Soca Website Attack: Norway Arrests Two Youths By packetstormsecurity.com Published On :: Wed, 09 May 2012 15:58:55 GMT Full Article headline hacker denial of service mpaa norway
w FBI Arrests 24 In Card Fraud Takedown By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 14:21:28 GMT Full Article headline bank usa britain cybercrime germany fbi norway
w E-Voting Experiments Ends In Norway Amid Security Fears By packetstormsecurity.com Published On :: Sun, 29 Jun 2014 16:46:22 GMT Full Article headline government flaw norway
w KeeWeb 1.14.0 HTML Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:23:04 GMT KeeWeb version 1.14.0 suffers from an html injection vulnerability. Full Article
w Exposed Orvibo Database Leaks Two Billion Records By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 13:57:53 GMT Full Article headline privacy database china data loss
w Gootkit Crew Left Database Exposed Without A Password By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 14:27:20 GMT Full Article headline malware database data loss fraud
w iWatch Filesystem Monitor 0.2.2 By packetstormsecurity.com Published On :: Wed, 18 Nov 2009 14:01:05 GMT iWatch is a real-time filesystem monitoring program. It is a tool for detecting any changes on your filesystem and reporting it to the system administrator immediately. It uses a simple configuration file in XML format and is based on inotify, a file change notification system in the Linux kernel. Full Article
w Attack On Apache Server Exposes Firewalls, Routers, Etc By packetstormsecurity.com Published On :: Thu, 06 Oct 2011 02:06:20 GMT Full Article headline flaw apache
w Apache Server Status Pages Put Popular Websites At Risk By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 04:02:21 GMT Full Article headline privacy data loss flaw apache
w Hackers Hit Thousands Of Sites With Apache Backdoor By packetstormsecurity.com Published On :: Tue, 30 Apr 2013 00:02:31 GMT Full Article headline malware backdoor apache
w Apache ActiveMQ Flaws Leave Servers Open To DoS Attacks By packetstormsecurity.com Published On :: Mon, 09 Mar 2015 20:04:49 GMT Full Article headline denial of service flaw apache
w 1 In 20 Android Apps Hit By Apache Cordova Flaw By packetstormsecurity.com Published On :: Thu, 28 May 2015 13:47:45 GMT Full Article headline phone flaw google apache
w Apache Struts 2 Needs Patching, Without Delay. It's Under Attack Now. By packetstormsecurity.com Published On :: Thu, 09 Mar 2017 16:15:22 GMT Full Article headline hacker flaw apache
w Apache Struts 2 Bug Bites Canada, Cisco, VMware, And Others By packetstormsecurity.com Published On :: Tue, 14 Mar 2017 15:11:27 GMT Full Article headline canada flaw cisco apache