Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.
2dd62bafb206c6005ee522e128d4e95ddfb8a55c0bb5a533fe1174cb80e34b8c
Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.
19bbf1fdbe1324ff2ced174a8f2d184803feb3b504d30584ac8f333a272bf693
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
deda9b4dbf3ab654660d399ea544a942dc3dad153f74a4e1b658a7185f30cfea
The ghostscript -dSAFER parameter that is used when handling untrusted documents appears broken on multiple distributions. This could result in arbitrary file disclosure on systems that process pdf, ps, use ImageMagick or graphicsmagick, etc.
dc280411e56c7501d5d20a65fe970344a58ad204857dc30600a3ba1be43070e4
Adobe Flash suffers from an AVC slice decoding crash.
4aab2c6a327dcfd3e4e5ae3793a05ef13051c567e6e7b7095e4080605c3b2550
Apache Tomcat versions 8.0.36-2 and below, 7.0.70-2 and below, and 6.0.45+dfsg-1~deb8ul and below suffer from a local root privilege escalation vulnerability.
893a92e39c86918879337de752d3a9e073dfec764fa778ff27ab1e26ede6e1a3
Adobe Flash suffers from an overflow vulnerability when processing MP4 files.
51908fb3a62f133d2a06ddf711f694d18139b52dca220df228dcd37584a52010
Android suffers from a pointer leak via insufficient binder message verification.
5e60c0e8348583a6ddae6fdb8fe4c044bd4a67f1f15764881f4fd4ec7829f95a