LW-N605R devices allow remote code execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.
405a54b7328103d274033ba1718a79ec36e34a387798e6c349e7e6c74465d240
Microsoft Baseline Security Analyzer version 2.3 suffers from an XML external entity injection vulnerability.
93c391e34088d358a2e2c716523db9450646ff3ced21181d0a85858a46bc542d
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
f3680478943ea6e8fdb55d8362bf166850dd033b03f6ef9a38f2ed7422b9d929
Whitepaper called Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale.
811cd201ac89a857b5fc25eef8ecb6f7b257c940273240e64655a62f279cc21a
Whitepaper called Open Source Intelligence Gathering 201. It covers 12 additional techniques.
b899f11c6c0178b866c84ac330a21773a01c5d31f566b1bfa92ebb03531d22ef
Avaya one-X versions 9.x, 10.0.x, and 10.1.x suffer from arbitrary file disclosure and deletion vulnerabilities.
fc1fefea9634475bbbb4693999d6ebf22e28f289b373c3065c44d068c1f14a41
Any Sound Recorder version 2.93 suffers from a denial of service vulnerability.
8933eb6e7dca5a81f21a4bf97ff0a15427be7d74b6768a6819de07426039f88f
This is the second part of a multiple series of a tutorial called "Hypervisor From Scratch". This paper focuses on Entering VMX Operation.
9b63376d7f63c5f5a72bce521e57092fe32aed9c28de9e9489a1df6a7d78e68b
Zenmap (Nmap) version 7.70 denial of service proof of concept exploit.
01480dbf49765ff3e98eebe7d3e0236de5b8c7e39187651526bae016912ba308
This whitepaper is an out of band exploitation cheatsheet.
13835c7d2fcf09e6205f8695749b87d837dab7fd2a69f065d8198f763f49f78b
Photo To Video Converter Professional version 8.07 suffers from a buffer overflow vulnerability.
de8c81394d6edaaa111b7d8b46761a4ae2b823e280981c03ff5911a886c2ed41
Flash Slideshow Maker Professional version 5.20 suffers from a buffer overflow vulnerability.
23b83555547e2be542a6d7a1b0cfa5dc11e4e94e240df915e76285f6b8a11b8a
This is the first part of a multi-part series of tutorials called "Hypervisor From Scratch". As the name implies, this course contains technical details to create a basic Virtual Machine based on hardware virtualization. If you follow the course, you will be able to create your own virtual environment and you will get an understanding of how VMWare, VirtualBox, KVM and other virtualization sores use processors' facilities to create a virtual environment.
a32f09040ae82a277e8029a12b305598ed8004af1bdd6eb13d5088dcfbcdc946
Whitepaper called How We Micropatched A Publicly Dropped 0day In Task Scheduler.
deb36065ff9819bcfd1cef3afaa4a9f94c43d49d8869f350b053313e7ada99d6
Socusoft 3GP Photo Slideshow version 8.05 suffers from a buffer overflow vulnerability.
4136726b78ce1dd6de5138d462721f59777c164a788f1672c3abe054142c8b6c
SocuSoft iPod Photo Slideshow version 8.05 suffers from a buffer overflow vulnerability.
46ae09baf70aceffead1ce71535e9a43b089fade377c4452bececb2751c195bb