rConfig versions 3.1.1 and below suffer from a local file inclusion vulnerability.
e9527ef095ee289314dcf815489ccfdfa8ec90419bc3a1c7c408fd0d5795eada
Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, is vulnerable to local privilege escalation via command injection. Cumulus Linux's clcmd_server, when receiving commands that end in user supplied labels, will execute any other command appended to the end of it whether it is in the Rosetta or not. And it will do so using its own running credentials which are root. Versions 2.5.3 and earlier are affected.
a1fb04f6cf34bae2b04ccf1d59b164a1842267b7fa3db86f1b9bd93597c10072
Opendaylight version 1.0 suffers from local file inclusion and remote file inclusion vulnerabilities in the Netconf (TCP) service.
b4c4f777d826b243c739648f5e37ec62fdf64c8901732abd6398dcdb787c830e
IDGuard is a platform for preventing network-layer fingerprinting on the network.
e74cff8ac02aee2f88120d537a2045f22432fb21ad7ce9105643543c75bcce95
pMap is a tool for for passively discovering, scanning, and fingerprinting hosts on the local network. Included is a precompiled Windows binary.
095bcea8b6a33df4cbab7a6c095be48be3754fb9ddf32a1ef3e207c81bb547a5