Monthly Archives: August 2016
Newtec Satellite Modem MDM6000 2.2.5 Cross Site Scripting
Newtec Satellite Modem version MDM6000 2.2.5 suffers from a cross site scripting vulnerability.
Sakai 10.7 Cross Site Scripting / Local File Inclusion
Sakai version 10.7 suffers from cross site scripting and local file inclusion vulnerabilities.
WordPress 4.5.3 Core Ajax Handlers Path Traversal
WordPress version 4.5.3 suffers from a path traversal vulnerability in the core ajax handlers.
Vuln: Flexera Software InstallShield CVE-2016-2542 DLL Loading Local Privilege Escalation Vulnerability
Flexera Software InstallShield CVE-2016-2542 DLL Loading Local Privilege Escalation Vulnerability
SAP HANA SPS09 1.00.091.00.1418659308 EXPORT Information Disclosure
SAP HANA SPS09 version 1.00.091.00.1418659308 suffers from an information disclosure vulnerability in EXPORT.
Hashcat Advanced Password Recovery 3.10 Binary Release
hashcat is an advanced GPU hash cracking utility that includes the World’s fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.
Hashcat Advanced Password Recovery 3.10 Source Code
hashcat is an advanced GPU hash cracking utility that includes the World’s fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.
ifchk 1.0.5
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
Fortinet Cookie Overflow Remote Code Execution (EGREGIOUSBLUNDER)
An overflow vulnerability exists in authentication cookie on Fortinet firewalls. A remote attacker could exploit this vulnerability to execute arbitrary code on the affected system.