Analyzing Encoded Shellcode with scdbg, (Mon, Sep 24th)
Reader Jason analyzed a malicious RTF file: using OfficeMalScanner and xorsearch he was able to extract and find the entry point of the shellcode, but scdbg was not able to emulate the shellcode.
https://isc.sans.edu/diary/rss/24134
Vulnerabilities
Multiple Vulnerabilities in Cisco Identity Services Engine