Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
729cd11e9715c600e5ad74ca472bacf8af32c20902192d5f2b271268511d4d29
scanlogd is a system daemon which attempts to log all portscans of a host to the syslog, in a secure fashion.
0bec45ecbcc8a9a3599cb38e21dcacf639ca3b33bb6973b20261315d065ea158
The bd daemon, which runs as part of the F5 BIG-IP Application Security Manager (ASM), is vulnerable to a stack-based buffer overflow when processing overlong HTTP response headers in the is_hdr_criteria_matches function.
9c44ca360a14fa4cc12518c3c7b3dc3db600141f5960afa5516ad2e74a06f1b5
Big IP's Traffic Management Microkernels (TMM) URI normalization incorrectly handles invalid IPv6 hostnames allowing for information disclosure and an out-of-bounds write condition.
3871783e2fe19713b45a5661f9772f7a4d4281e5f8687d7bb3041ddb2bd1b662
Red Hat Security Advisory 2021-0809-01 - The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2, and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. Issues addressed include a use-after-free vulnerability.
be110896c5f3adbcc18da2e72f9339af2662aeaadc796e7d97cbddd0459139e4
Trojan-Dropper.Win32.Hamer.10 malware suffers from a denial of service vulnerability.
d708da0d138948c87e142ed9d9d8a75ab6d0e20892f000a2f155b7633e6ba586
Nsasoft Hardware Software Inventory version 1.6.4.0 suffers from a denial of service vulnerability.
070319f0e6f67ac2f43bc8b0ae4409d42ebf74c223554a102fb316a5c9f45d0a
Red Hat Security Advisory 2021-0713-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a denial of service vulnerability.
1820eca6dee33612430eff71ffc8008dfdf41b11f53474c844a025ed27b659cc
Trojan-Spy.Win32.KeyLogger.qt malware suffers from an insecure permissions vulnerability.
d9378b0c8bab74218fff6a68f0fc1d7a7f7faa08056e6f96751834e00d762ebc
MyBB OUGC Feedback plugin version 1.8.22 suffers from a cross site scripting vulnerability.
ea0c9479e67ce68e72fbbd6bc016ac9fc12e82287e3cbb52c9d09b134869e902
Microsoft Exchange Proxylogon server-side request forgery proof of concept exploit.
1c373baa158377a14fb2382356cc246aad42c9f3070e607c68d7ad613fbc6796