Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.
a89c895e226870d4a187787ae94b98a04fbcb0a31f0e711d39b40e3db1b26b4c
Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.
43ffe3bd19cafbc4f24c53c6d80810297ebfbf9a72b693e58e59775813ee66ec
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
4db24feaff8db4bbb7edb7a4b8f5f8edc39b26eb5feccc99e8e67a6960c05587
Ubuntu Security Notice 3408-1 - It was discovered that an illegal address access can be made in Liblouis. A remote attacker can take advantage of this to access sensitive information. It was discovered a heap-based buffer overflow that causes bytes out-of-bounds write in Liblouis. A remote attacker can use this to denial of service or remote code execution. It was discovered a stack-based buffer overflow in Liblouis. A remote attacker can use this to denial of service or possibly unspecified other impact. Various other issues were also addressed.
f3ba5935a40f160db99d5d196f0b4d6102f67aa4b826403352ef95b9775b3862
Wibu Systems AG CodeMeter version 6.5.0 suffers from a persistent cross site scripting vulnerability.
61c51042dec76d0248537423dac3c5d79c859d526ba59af8555d968b688594c1
WordPress WpJobBoard plugin version 4.5.1 suffers from multiple cross site scripting vulnerabilities.
07f7f6d48ad93e7984851607c9871b1ca877c2ba12241a8dead54dca41a86c56
Wireless Repeater BE126 suffers from a remote code execution vulnerability.
c8e19ae886cb77a18bac562c6f3f7e9904f47cc6b3126817182087d1199b7f4d
RubyGems versions prior to 2.6.13 suffer from an arbitrary file overwrite vulnerability.
5f0b5ac5db21edcc3e5c32e56de1609e34f4b58dbabc2dc6559d4ca4c790e216
eNom appears to not check for any confirmation from owners when performing domain transfers.
7d1433ffdd79806fa4a68d7ea53eabd7f14ddfaacf0cc208ce1f0b2f176d6f1d
libgedit.a versions 3.22.1 and below suffer from a denial of service vulnerability.
cac7e3249daa80e7e6c5fee8123d3bb7156fe3aed36f5446e5a5caf356d6d9ac
Vulnerable versions of the Motorola Android Bootloader (ABOOT) allow for kernel command-line injection. Additionally it suffers from a bypass vulnerability.
f8f8777805bf6e98e486f708a506572461b27529339eefe20434106273e475dc
Play TV version 1.25.1 build r123776 suffers from a DLL hijacking vulnerability.
3d3e46dc9cf7d9a59aa5450993ae9e8bb4500c8cb58df1e02ea572305a39a99e
Whitepaper that discussions both code and html injection attacks.
b3ca3731546e7a16718658a97d74c12127c957c735d7ff2df490f9ac9336b9fb