This Metasploit module will run a payload when the package manager is used. No handler is run automatically so you must configure an appropriate exploit/multi/handler to connect. Module modifies a yum plugin to launch a binary of choice. grep -F 'enabled=1' /etc/yum/pluginconf.d/ will show what plugins are currently enabled on the system.
9ad4ebf5274d32a4ec5669f7650369e77279b0e58aed7f270adb6811aa5ef260
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
2da50d91f92adf8b1af930f388361f76424420b88f553f610e2780e4240f2009
Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
d47ce9415527099c24ec20155c09bc95f6b268293fd545bd5c6eb0d8a30e975a
Red Hat Security Advisory 2019-0910-01 - This release of Red Hat Fuse 7.3 serves as a replacement for Red Hat Fuse 7.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a deserialization vulnerability.
05dca764a934db5626dabfbc55d7cc06a8facaf44f0a09956efa3c45a18c1a26
This Metasploit module exploits an unauthenticated directory traversal vulnerability which exists in Spring Cloud Config versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6. Spring Cloud Config listens by default on port 8888.
39f19c1a165c51512a1ca99f92c17456b0d2f8470dbf6c008d92f912f1f1c01c
Apache Archiva versions 2.0.0 through 2.2.3 suffer from arbitrary file write and delete vulnerabilities.
b8dcaeba46cd142605678810a1d0b6c2dc035a30e2018fe9649c17695c0a0b12
HumHub version 1.3.12 suffers from a cross site scripting vulnerability.
833a078f74bc411708c3495ba863cad28419973cc7f3626a83783ba163375047
Intelbras IWR 3000N version 1.5.0 proof of concept cross site request forgery exploit.
cf7ff25f03a131cf316c68a456b3d754f7ace15951e5f16103e4b453f998461b
Apache Archiva versions 2.0.0 through 2.2.3 suffer from a persistent cross site scripting vulnerability.
dcd6152ced13abecbc177d100e88e12766627dc4e3c81c5b7a982d5a7b43b20d
Intelbras IWR 3000N proof of concept denial of service exploit that triggers a remote reboot.
99dce382b8fdd144eab93a9768bfc2d33e27b1f398b46695f88cc3404f997809
Ubuntu Security Notice 3960-1 - It was discovered that WavPack incorrectly handled certain DFF files. An attacker could possibly use this issue to cause a denial of service.
e5c36b8236e5dcac5f3e631829a426222f458001fa01af8cacd7e1b7017756d3
Domoticz versions 4.10577 and below suffer from an unauthenticated remote command execution vulnerability.
9179905040e0065103a3e0fea2732062a8d71d1efcdc16a1187881a7648b8496
Veeam ONE Reporter version 9.5.0.3201 suffers from multiple persistent cross site scripting vulnerabilities.
f0325caeea7dbc072644dabcd22ddf217b800b7ca72a2a213022df33830844cd
Veeam ONE Reporter version 9.5.0.3201 suffers from multiple cross site request forgery vulnerabilities.
7935f970ef5b73c6b987406afcc2e78937136d079446ccf0a9a736f8bc769a00
Netgear DGN2200 and DGND3700 proof of concept administrative password disclosure exploit.
1ebbdd1c92e2e6c2d3be1f0ae4caf46fd96ca67370be6b729b67f566fd178d82
Freefloat FTP Server version 1.0 suffers from a STOR remote buffer overflow vulnerability.
5ace81317af651efd44942f8b4bda80940a213f47e4a743b250a8d4ae5cfb76f
Freefloat FTP Server version 1.0 suffers from a SIZE remote buffer overflow vulnerability.
583fd9120564a7a4274686a33c4957d70e7f4225537eb7b6cd60ae7f8a6491b4
This is a whitepaper that discusses bypassing a firewall using tunneling techniques. Written in Turkish.
c7b022d8f98bd3ad2bc62318bb20cac8cf163c3c7c88fb40ba138d97d7c4b302