THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.
52120bee2da3d25820f021b5c4d6fc79e220e685e2a505b74b48046b608cba8c
This Metasploit module exploits a vulnerability found in PhotoStore version 4.0.7. By abusing the uploadify.php file, a malicious user can upload a file to a temp directory without authentication, which results in arbitrary code execution.
3bdbec107d32194db2d22bea603f8df3b12edc8ee908c6cb6fb759053cc04b0b
Debian Linux Security Advisory 2828-1 - Multiple vulnerabilities have been discovered in Drupal, a fully-featured request forgery protection, insecure pseudo random number generation, code execution and incorrect security token validation.
9fca0e872421aa3d505fa144d23009d1dc2627543758b7bd99600341f0efc3ac
Gentoo Linux Security Advisory 201312-16 - A vulnerability in Xfig could result in execution of arbitrary code or Denial of Service. Versions less than 3.2.5b-r1 are affected.
329cda66c4f48a35b5aad71508c2e2994cd0c1f2425e37faf5a3f26fa4e57ef8
This is a brief write-up called Twenty Reasons Why Mass Surveillance Is Dangerous.
a3b2989e9050e8ee56d2b66ee2be1883dd4ff40472f7b0d217eb8861368e23bf