Cisco Catalyst 2960 with IOS version 12.2(55)SE1 ROCEM remote code execution exploit.
664cf049a097afea8487d7fd5f96060b2a8fe64c9070c71dd9862fbd7af9b402
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
f627d51eda85f5ae5f5c8c9fc1f6539ffc2a270dd7500dc7f67490a8534ca849
Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.
2c2eb4b44d8649611c833b65e2abf446870ef2d3d44d84e0f9b8e57d41fb1e33
The Nintendo 3DS DNS client resolver library uses a predictable (incremented) TXID allowing for the spoofing of responses.
f5c21a78f99b5f6cde7c75e94a484f05c6eb123b704e14150dcd8700cbaa9823
Adobe Creative Cloud Desktop Application versions 4.0.0.185 and below suffers from a privilege escalation vulnerability.
827a569de876d47f237cd9fd7f23b0c4c5fbb93def466e06cacef6af2a76aeeb
The c0c0n 2017 call for papers has been announced. It will take place August 17th through the 19th, 2017 at Le Meridien, Kochi (Cochin), Kerala, India
5e42b65f016f7e2b1cc8bee83f7fef72bcf990228cb29cdcd57ecb1df8e21a9b
Cisco Catalyst 2960 with IOS version 12.2(55)SE11 ROCEM remote code execution exploit.
b5161013a8a0cd5cb9435330c4717f753537962b89333395f92f95889edba133
Solaris versions 7 through 11 on both x86 and SPARC suffer from an EXTREMEPARR dtappgather local privilege escalation vulnerability.
1d0a7fc97f6c11277cffbbde3faa1e5dcaa3c351527a2b971ea140cbd1503bbb
Magento versions 2.1.6 and below suffers from cross site request forgery and shell upload vulnerabilities.
ec3736ddab1c899309a6378effc0830e101ad19846971bb0f43a9f8c173055b2
53+ WordPress plugins by BestWebSoft suffer from cross site scripting and cross site request forgery vulnerabilities.
ac02388134a501d8a15789449f8ecef4b36b72b6289146bef734ea4d63404a0e
Red Hat Security Advisory 2017-0907-01 - The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Security Fix: A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
5eb9400c2ea50eecfc21be6bb1f58a9909bf7048b8f363168e27e0b7d87c42da
This Metasploit module exploits a buffer overflow vulnerability found in the MKD command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.
7554b461ee61e44b7f64e4879b30d9782723c41189b5b3c85bfc7e4ab7909236
This Metasploit module exploits a buffer overflow vulnerability found in the NLST command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.
75a33189c18f2998275f368c20bcaf5332c87b4174b8022f4582c98f1470a080
This Metasploit module exploits a buffer overflow vulnerability found in the GET command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.
6fbfded44e9dd1be4d3ed2376281c4304931e33afc18abbb33e360d8dfbe3671
This Metasploit module exploits a buffer overflow vulnerability found in the ACCT command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.
778b224092c82d56aff83fabf349cd707929b75998f0d7e34268f516f295268c