This is a SUID, SIP, and binary entitlements universal OS X local privilege escalation exploit.
49924fa08f8b101fdbdbfba6d5e985f619bd430e2fafdbe9548a078782bb9339
EMC ViPR SRM versions prior to 3.7 suffer from a cross site request forgery vulnerability.
937f63577c3fcb4a53eaee2b489e94d280b7edee85b27ac120b653f7667e8d0f
AWS appears to suffer from a CAPTCHA bypass vulnerability.
2955e115e77880713afefd1475e050fa22bdfa2f21da64a85676517555945dc6
Voo branded Netgear CG3700b custom firmware version 2.02.03 suffers from cross site request forgery and insufficient authentication vulnerabilities.
f2bfc41c1d1c5ce03e952d1ce938bc3be05839005ba5499d8e7a71df4a8182a6
The CSRSS BaseSrv RPC call BaseSrvCheckVDM allows you to create a new process with the anonymous token, which results on a new process in session 0 which can be abused to elevate privileges.
f24c7d593d547e23379c3440dbf5f7f452e40b8133e8dd3211fa702220bba978
The GreHack 2016 Call For Papers has been announced. GreHack is an international security conference which takes place in Grenoble (France). It aims to bring together academics, industry, governments, students and hackers to discuss new advances in computer and information security research. This year will be the fourth edition. As always, conferences will take place during the day, and you will be able to test your hacking skills with the Capture The Flag contest that will hold during the night. It will take place on November 18th, 2016.
1ae8900f2944a88bcdd90f3159a78863cd84ae21a5f8d3315ba6b37f8d9f4f74
RomPager versions 4.34 and below router authentication remover exploit.
38645aa2c86dfa0cb64d4619e5778ca2411cb0f863d9768a0f6f53af705c2c8e
Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
1dbdc48d65e150f2dbb43f1e4f4700d94166e053b1c7bbbdedf4ad670283720e
Sophos XG Firewall (SF01V) suffers from a cross site scripting vulnerability.
d40c538cdcd71b7e182b19515a9c3cc792fcb182d52b84a21cdcea81b967c2ba
Trend Micro's website suffered from an email spoofing vulnerability.
e036a8a755636cc38be306245627af052b92cd4305af973b466af3b9e30bb747
Oracle Discoverer Viewer BI suffered from an open redirection vulnerability.
e23c0a5e2dc5af6727a12408ff49391c3f3651447979dec521f61fe2e285dff3