Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
f007e4b88c86d95e33af03e057ecc03635f54466d02371bc26489eabb274faba
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
81e92ccfb7902159db47a4702357be5199646a757d880c378814a0e093741def
Ubuntu Security Notice 4327-1 - Yasheng Yang discovered that libssh incorrectly handled AES-CTR ciphers. A remote attacker could possibly use this issue to cause libssh to crash, resulting in a denial of service.
0c37dd2df5471e0ca6e662779d85139029735c0748c711b4b5e1dbe8a5484aa9
Red Hat Security Advisory 2020-1420-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.7.0 ESR. Issues addressed include an out of bounds write vulnerability.
91d71ac20d68786361b6cfb964fadb3393be599f3fe0f962e69f629b1150825d
netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw.
0c7c190bc3e955ffedd16a90504abb79b5245412afb286a43ee38af4ebf3a6c4
Symantec Web Gateway version 5.0.2.8 pre-authentication remote code execution exploit.
970b84a1292b0d6cf8128d51ac617317c8cdfa0985e3672aeee25722afec7b54
NagiosXL version 5.6.11 post authentication orderby parameter remote SQL injection exploit.
5b7280585819afb90f9056b2f48942ba062dc884bc0991afeaddcc45f7440a4f
Centreon version 19.11 post authentication acl_res_name parameter remote SQL injection vulnerability.
26ddd5ca918503c36714484e708d799c5b8b0c860297a0d6fef820a51abd2fdc
NagiosXI version 5.6.11 post authentication start, end, and step parameter remote code execution exploit.
031602c56f2aaed8028f670cedf7bcaeea0adc9a27dbd5faa77afcb3ff87e286
Symantec Web Gateway version 5.0.2.8 post authentication remote code execution exploit.
02346ae04aa267009c24e0117a0c4d7990844c5da0d0bae1cd4c22edf7e2cd9c
NagiosXI version 5.6.11 post authentication address parameter remote code execution exploit.
428cf9e7378b1a7c753e11aa12708d599dc69c144f7915dad4f27913824c00eb