k

SI6 Networks' IPv6 Toolkit 1.3.4

This toolkit houses various IPv6 tools that have been tested to compile and run on Debian GNU/Linux 6.0, FreeBSD 9.0, NetBSD 5.1, OpenBSD 5.0, Mac OS 10.8.0, and Ubuntu 11.10.




k

Rootkit Hunter 1.4.2

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.




k

Check Rootkit 0.50

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.




k

NetBSD Stack Clash Proof Of Concept

NetBSD stack clash proof of concept exploit.




k

Rootkit Hunter 1.4.4

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.




k

Telegram DDoS Attack Launched Mostly From China




k

Anonymous Hacker Gets 6 Years For Some Lame DDoS Attacks






k

SoundCloud Tackles DoS, Account Takeover Issues




k

16 DDoS Attacks Take Place Every 60 Seconds, Rates Reach 622 Gbps




k

Realtek SDK Information Disclosure / Code Execution

Realtek SDK based routers suffer from information disclosure, incorrect access control, insecure password storage, code execution, and incorrectly implemented CAPTCHA vulnerabilities.




k

SWAPGS Attack Proof Of Concept

SWAPGS attack proof of concept exploit that demonstrates an information disclosure in the windows kernel.




k

Broadcom Wi-Fi KR00K Proof Of Concept

Broadcom Wi-Fi device KR00K information disclosure proof of concept exploit. It works on WPA2 AES CCMP with Frequency 2.4GHz WLANs.




k

Netis E1+ 1.2.32533 Password Leak

Netis E1+ version 1.2.32533 suffers from an unauthenticated wifi password disclosure vulnerability.




k

webERP 4.15.1 Backup Disclosure

webERP version 4.15.1 suffers from an unauthenticated backup file disclosure vulnerability.




k

Cisco DCNM JBoss 10.4 Credential Leakage

Cisco DCNM JBoss version 10.4 suffers from a credential leakage vulnerability.




k

Cisco Discovery Protocol (CDP) Remote Device Takeover

Armis has discovered five critical, zero-day vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over devices.




k

Cisco Data Center Network Manager 11.2 Remote Code Execution

Cisco Data Center Network Manager version 11.2 remote code execution exploit.




k

Cisco Data Center Network Manager 11.2.1 SQL Injection

Cisco Data Center Network Manager version 11.2.1 suffers from a remote SQL injection vulnerability.




k

Cisco Data Center Network Manager 11.2.1 Command Injection

Cisco Data Center Network Manager version 11.2.1 remote command injection exploit.




k

Asterisk Project Security Advisory - AST-2017-011

Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed.




k

Qualys Security Advisory - GNU C Library Memory Leak / Buffer Overflow

Qualys has discovered a memory leak and a buffer overflow in the dynamic loader (ld.so) of the GNU C Library (glibc).




k

GNU Barcode 0.99 Memory Leak

GNU Barcode version 0.99 suffers from a memory leak vulnerability.




k

ImageMagick Memory Leak

ImageMagick versions prior to 7.0.8-9 suffers from a memory leak vulnerability.




k

LibTIFF 4.0.8 Memory Leak

LibTIFF version 4.0.8 suffers from multiple memory leak vulnerabilities.




k

KVM kvm_inject_page_fault Uninitialized Memory Leak

KVM suffers from an uninitialized memory leak vulnerability in kvm_inject_page_fault.




k

Nanometrics Centaur / TitanSMA Unauthenticated Remote Memory Leak

An information disclosure vulnerability exists when Centaur and TitanSMA fail to properly protect critical system logs such as 'syslog'. Additionally, the implemented Jetty version (9.4.z-SNAPSHOT) suffers from a memory leak of shared buffers that was (supposedly) patched in Jetty version 9.2.9.v20150224.




k

Nanometrics Centaur 4.3.23 Memory Leak

Nanometrics Centaur version 4.3.23 suffers from an unauthenticated remote memory leak vulnerability.




k

prdelka-vs-SGI-xrunpriv

SGI IRIX 6.5 /usr/sysadm/bin/runpriv local root exploit.




k

IRIX Local Kernel Memory Disclosure / Denial Of Service

IRIX suffers from local kernel memory disclosure and denial of service vulnerabilities.




k

SGI IRIX 6.4.x Run-Time Linker Arbitrary File Creation

SGI IRIX versions 6.4.x and below run-time linker (rld) arbitrary file creation exploit.




k

Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall








k

TBA_Handbook.doc

Documentation for TBA, the first wardialer for the PalmOS platform. In Microsoft Word format.












k

NanoCore Trojan Is Protected In Memory From Being Killed Off