Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
8d50d031fc3848ad9a6694df97adacbe
ATool version 1.0.0.22 suffers from a kernel pool buffer overflow vulnerability.
d1696ed6f1d2fe4d3cbc45aecd34e668
Gentoo Linux Security Advisory 201812-9 - Multiple vulnerabilities have been found in Go, the worst which could lead to the execution of arbitrary code. Versions less than 1.10.7 are affected.
399ebf3a21c402d1d7fd3777c8d29050
SQLScan version 1.0 denial of service proof of concept exploit.
22c3088441718cf544a0a2250ac2d142
WordPress WP-Ajax-Form-Pro plugin version 5.0.2 suffers from a remote shell upload vulnerability.
b293b36a808a6b12d983ec540fc9118c
WordPress Saphali-Customer-Reviews plugin version 5.0.2 suffers from a remote shell upload vulnerability.
8537d8272d882c5229af5be3e34830b8
WordPress Share-Buttons plugin version 4.9.9 suffers from a remote shell upload vulnerability.
0030f65379b39dd239748ae97d8bfba0
WordPress Cvp-Adegrontec theme version 4.8.3 suffers from a remote shell upload vulnerability.
3b6faa5f189abe7892260fa2da388fff
WordPress Firma Rehberi theme version 4.9.9 suffers from remote shell upload and remote SQL injection vulnerabilities.
e71809bce3fc6606f39e6e94200149a8
ZeusCart version 4.0 suffers from a cross site request forgery vulnerability.
1d101831cb8b24e6de8368866f79ee4a
Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed.
4f0f2b6cb76404194c75a1d6b9ff1f4d
Microsoft Edge version 42.17134.1.0 Tree::ANode::DocumentLayout denial of service proof of concept exploit.
f82ad010d732356c3d16a3c6bfe9abb4
D-Link DIR-140L and DIR-640L suffer from an administrative credential disclosure vulnerability.
3208b94d43c07155b89aca72e51dd708
D-Link DSL-2770L, DIR-140L, DIR-640L, DWR-116, DWR-512, DWR-555, and DWR-921 all suffer from an administrative credential disclosure vulnerability.
5b5fa50f592407494d725b1d6d5ed34f
D-Link DSL-2770L suffers from an administrative credential disclosure vulnerability.
b7b3550565b1151ecb1ae941913b666b
AnyBurn version 4.3 SEH local buffer overflow exploit.
2647139a9e50e499f8b41f2579de83bf
Angry IP Scanner version 3.5.3 denial of service proof of concept exploit.
0fae14856209e6a826b15a4cf2405c8a