Automatic-Systems SOC FL9600 FastLine version V06 has hardcoded credentials for super admin functionality.
8d39714181692d67f93a9e46f5f0953216b012889a3b7ebbe7fa9cd7bf60bd0d
Automatic-Systems SOC FL9600 FastLine version V06 suffers from a directory traversal vulnerability.
e43491c92de6a6e95e9bcf00c8f526235bfba3e6efc005c1ff1ac8382b3fa1ae
Scanmycode is based on QuantifedCode. QuantifiedCode is a code analysis and automation platform. It helps you to keep track of issues and metrics in your software projects, and can be easily extended to support new types of analyses.
e28c19bb8ef7a7e3b7d38386219fa4cb37f386016b6f914739deeb6a63addeca
This is an LLVM based tool to audit Linux kernel module security using both pointer and taint analyses that are flow-sensitive, context-sensitive, and fieldsensitive on kernel drivers. It is port of Dr. Checker.
1fd358d47de323bd7dadfb4148d4c52f11fe6a9eca3e9dbc43431082fd5c62a9
TCMalloc is an inspection tool that lets you parse and inspect tcmalloc internals, and detect lost memory, meaning memory which is not reachable via any (internal) pointers.
2b86aa20695ff99c9d185ed04df1ba3584158ebaa73e1ac6836170d8afc84ad0
This archive holds Bluetooth Impersonation Attack (BIAS) CVE-2020-10135 proof of concept and reproduction research from multiple researchers.
41004a9e2b60df9ce140f6ce8134c8d2d77630719d6ee1ae883f9de82e4b456b
jQuery versions prior to 3.5 suffer from an html() cross site scripting vulnerability.
806fd26fbc6fd6a800e9b74e6dd857dc88fdeef9c3b39d821ec111c8bb913aef
Proof of concept crash exploit for pppd versions 2.4.2 through 2.4.8. It leverages a rhostname buffer overflow in the eap_request and eap_response functions in eap.c.
5f3f031504ced5c6e33a19ffcc5762feb18c6704650c050b6b15df49d8a9357d
A double free vulnerability in the DDGifSlurp function in decoding.c in libpl_droidsonroids_gif before 1.2.15, as used in WhatsApp for Android before 2.19.244, allows remote attackers to execute arbitrary code or cause a denial of service. CVE-2019-11932 is a vulnerability in the android-gif-drawable library. Yet the CVE text doesn't mention "android-gif-drawable". It only mentions WhatsApp. There could be over 28,400 free Android apps that use this library.
deb671a58483113fa01c7556131f6c1924fc8c60528a056679836812d446ff89
These are notes on further exploitation of the Android Binder use-after-free vulnerability as noted in CVE-2019-2215 and leveraged against Kernel 3.4.x and 3.18.x on Samsung Devices using Samsung Android and LineageOS.
e1a2e97063e031e1295f8213749b666e7722c92fde1fd5b0de1274b5316e32f1
VideoPlayer on Android versions 7 through 9 suffer from an ihevcd_parse_pps out-of-bounds write vulnerability.
641316a0c31ea9598297b3208706dd4ecbdd3747d0c8cf2d223873bb200df9dd
This paper and proof of concept describes the Wiederganger-Attack, a new attack vector that reliably allows to escalate unbounded array access vulnerabilities occurring in specifically allocated memory regions to full code execution on programs running on i386/x86_64 Linux. Wiederganger-attacks abuse determinism in Linux ASLR implementation combined with the fact that (even with protection mechanisms such as relro and glibc's pointer mangling enabled) there exist easy-to-hijack, writable (function) pointers in application memory.
778d2218c137533f1b5a870d4881b65e376de7c26bbe92fcc05d05af21c7c1e1
LineageOS version 14.1 Blueborne suffers from a remote code execution vulnerability.
118abf176aea0790980dec87b92c424f9758c2fd8db35e43bc7364522de3fcfa
BlueBorne BlueTooth buffer overflow proof of concept exploit that causes a denial of service vulnerability on Linux kernels prior to 4.13.1.
974f187dadca11aa8a6672fa308652e8c4e301f2e239dcd9ebe671ec208a6e34
Ntpd versions ntp-4.2.6p5 and below ctl_putdata() buffer overflow exploit.
20c1ff267a8bcac5da58926e1274d79d39784fce12793f29a8cdf27998079989
Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (including cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer) and information gathered from numerous security resources and websites. It is capable of spidering a website and identifying inputs.
4ee9ca809287166d059f03478f84ab9ae3b6ab083adaee34d3b2091de62e924b
Microsoft Windows Message Queueing Server RPC buffer overflow exploit that relates to MS07-065.
ae024ee0b98228f5ca3aa6c85b6654e303aaa2be37dce6d521de55a1d196b859
Apache mod_rewrite escape_absolute_uri() off-by-one buffer overflow Metasploit exploit module. This affects Apache versions 1.3.28 through 1.3.36, 2.0.46 through 2.0.58, and 2.2.1 through 2.2.2.
503139768b0cda278959c2bc8df18f7cb0aee2077db8a28468990531d48c3000
3Proxy versions below 0.5.3h remote buffer overflow exploit that takes advantage of a vulnerability in logurl().
926292037e0da8602004851e43faaf9a45ad65581dc592a0d00794c9a0e267b9