EMPHASISMINE is an IMAP exploit for IBM Lotus Domino. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
EMERALDTHREAD 3.0.0 Windows 2003 / XP SMB Exploit
EMERALDTHREAD exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
EDUCATEDSCHOLAR 1.0.0 MS09-050 SMB Exploit
EDUCATEDSCHOLAR exploits the SMB vulnerability patched by MS09-050. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
EASYPI 3.1.0 Lotus CC Mail Exploit
EASYPI is a Lotus exploit that leverage CC. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit
ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
EASYBEE 1.0.1 MDaemon Private Email Server Exploit
EASYBEE is an exploit for the MDaemon private email server. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
Equation Group Data Leak As Of 04/14/2017
This is a very large archive (500 MB) of all exploits, implants, and more from the Equation Group that has been leaked by the Shadow Brokers as of 04/14/2017. Consider anything inside of this archive hostile and unverified. For research purposes only.
Scriptler Jenkins 2.9 Cross Site Scripting
Scriptler Jenkins version 2.9 suffers from a cross site scripting vulnerability.
Linux Kernel 4.8.0 udev 232 Privilege Escalation
Linux Kernel version 4.8.0 with udev version 232 suffers from a privilege escalation vulnerability.
Kernel Live Patch Security Notice LSN-0021-1
Several security issues were fixed in the kernel. Andrey Konovalov discovered that the AF_PACKET implementation in the Linux kernel did not properly validate certain block-size data. A local attacker could use this to cause a denial of service (system crash). ( Andrey Konovalov discovered a use-after-free vulnerability in the DCCP implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. Various other issues were also addressed.