Cisco Catalyst 2960 with IOS version 12.2(55)SE1 ROCEM remote code execution exploit.
3a6c0e64cf90f6b40458df2e040554da
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
2cd9a35c2df8c32668c1776784f074df
Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.
477bcf4f4f8b5e2294e46d20f0d9f8d1
The Nintendo 3DS DNS client resolver library uses a predictable (incremented) TXID allowing for the spoofing of responses.
1a36d85c0eeb7997eb6742ffbdb2d91c
Adobe Creative Cloud Desktop Application versions 4.0.0.185 and below suffers from a privilege escalation vulnerability.
756a9de01f66ce75a113cd74a214ddf5
The c0c0n 2017 call for papers has been announced. It will take place August 17th through the 19th, 2017 at Le Meridien, Kochi (Cochin), Kerala, India
334aec1e51ee1622244bb760b9b471c9
Cisco Catalyst 2960 with IOS version 12.2(55)SE11 ROCEM remote code execution exploit.
252028a693dd29d6d6ffaef31e0a9c10
Solaris versions 7 through 11 on both x86 and SPARC suffer from an EXTREMEPARR dtappgather local privilege escalation vulnerability.
595fcc194d20c3822c1f5175c0a7f718
Magento versions 2.1.6 and below suffers from cross site request forgery and shell upload vulnerabilities.
7eac7c985713b9e6f32be4da1b6565bb
53+ WordPress plugins by BestWebSoft suffer from cross site scripting and cross site request forgery vulnerabilities.
265031dbb6abada51eb891db78c25fcd
Red Hat Security Advisory 2017-0907-01 - The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Security Fix: A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
93c10550a948ee9d87b62d5f4b167202
This Metasploit module exploits a buffer overflow vulnerability found in the MKD command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.
f51eee60f4b6d506307ef2bb13158e90
This Metasploit module exploits a buffer overflow vulnerability found in the NLST command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.
fdda4c2888a7a1cdc5a9c46c6e91f452
This Metasploit module exploits a buffer overflow vulnerability found in the GET command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.
b2a557cc8ff5274c8acfcc5453468889
This Metasploit module exploits a buffer overflow vulnerability found in the ACCT command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.
3f80eb27201d8e4047d9c02ed69f55a7