The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, CVSS, OVAL, and XCCDF.
7364f98182891ef6a81674c766cbdc4c53cf86543da2245450f09e43f8987793
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
e1b5b2303f174f46fcf60fb530583b72ccb656dda503905d8fecee58200403f3
This Metasploit module exploits a vulnerability found on Siemens FactoryLink 8. The vulnerability occurs when CSService.exe processes a CSMSG_ListFiles_REQ message, the user-supplied path first gets converted to ANSI format (CodePage 0), and then gets handled by a logging routine where proper bounds checking is not done, therefore causing a stack-based buffer overflow, and results arbitrary code execution.
65d113826f876957b01b3af64f658a9a29b8bdb88aec0e06454d38d90a4b7bf2
This Metasploit module exploits a stack buffer overflow in Lotus Notes 8.5.2 when parsing a specially crafted malformed LZH file.
586c66862bafd377500c8e876fa1e8873495442d87c69db83d2135714084cd73
Whitepaper called Post Exploitation using Metasploit pivot and port forward. A very nice feature in Metasploit is the ability to pivot through a meterpreter session to the network on the other side. This tutorial walks you through how this is done once you have a meterpreter session on a foreign box.
a05be3bd008961eca995330559a8b1aed77254c9151b49ae3060c36de9ee2372
eHub suffers from a remote SQL injection vulnerability.
99ce8e49c4f31e2f7feed4f625873710940af4c87c14b79a837f91bc6960874f
Misronline suffers from a remote SQL injection vulnerability.
a4ee031ea4cda946d7e899b66ed0b385480dabc70c011e58c6de8d0c41d9d3cc
Quram suffers from a remote blind SQL injection vulnerability.
50e91a97f96673e10ecb035d5880fb0d9967e31bee52a6ed10d9aafa22c286cb
nodesforum suffers from a remote SQL injection vulnerability.
7692b4a2838a94061abee35f2e2405e50c16520117444413270104decd2ccf2f
The Easewe FTP OCX ActiveX control suffers from an insecure method vulnerability.
4a9c90d45d0c708c1708e291908cb56414bc74ffcd886c5df2f50def8f299887
FreeAmp version 2.0.7 local buffer overflow exploit that creates a malicious .pls file.
308ab11f2015f37a7153bf4befb6cd509e2a3466de48ec24e621abd6c75565eb
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
b70d19d88ee171387922236b7e6072cb12ac39e33067b69a44d272f3e350c1b3