haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.
6d7ab185c3f5ab8e2203a05aaa0308d3f61edd96799eaab61c9971dc6252185f
sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
78c654fbffc4af710f11d2be614e198fb5b13e526dd38c960048ae1eadffaf29
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
0434eda8fb6bf88e2b42a67eb5d1de254a67d505bec3bb51fee9d7cad7925a38
Zoom suffers from an information leak vulnerability in the MMR server.
ceaa806e1faea132492fe57be7bbd693988b712326fabb4aec96193d0e3374d0
Red Hat Security Advisory 2022-0003-03 - X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include an out of bounds access vulnerability.
4987bdc6ea04486a66b72df22c81cd94b1f64631deb89d4680d5fa99d64efe7f
Zoom suffers from a buffer overflow vulnerability related to the processing of chat message.
a6e816c46fce3985cc7b2b11b9e6f3edebe9b65dcbbbf65037027c3d32e954f0
Red Hat Security Advisory 2022-0001-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
16b511ba4921cedf910127e5f1176b93411a27d26c3df7904d0c5a21d6002169
Backdoor.Win32.SilentSpy.10 malware suffers from an authentication related race condition vulnerability.
1ac0b7dbaed7a53c71134caabc63b76c9a7d4ded9f7a76f89eab2d0a9eaff37e
WordPress CRM Form Entries versions prior to 1.1.7 appear susceptible to a cross site scripting vulnerability.
9b2a5dc4d381f00d8d66a8167361aff8b5627a616bf4ea6649983346499ca217
Backdoor.Win32.SilentSpy.10 malware suffers from authentication bypass and command execution vulnerabilities.
b65db49f714e940c9ee6d430755f43aa22faf110a28f42182efc75ac104779e7
Backdoor.Win32.Skrat malware suffers from an insecure password storage vulnerability.
5649c6950f1c0299b5dc6c880265799e37a83555341bcc6af96eace04380777e
Red Hat Security Advisory 2022-0002-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
47d3139682f18b68f82738438119153365f3f5054d15e0e28c8d7ad5af0853b0
Backdoor.Win32.Fantador malware suffers from a denial of service vulnerability.
f080626a9bfa875cadbd0b0e552603f5db4beacc5cad69456ead594a2654240a
Backdoor.Win32.Fantador malware suffers from an insecure password storage vulnerability.
630ee6aa907a92985f8e4a30f870bf49de1e5a02c661fadeab13c86d5d8e3772
BeyondTrust Remote Support versions 6.0 and below suffer from a cross site scripting vulnerability.
c974011f5f45022352dcdbc5bd9c817581fc98bdbc3b7b45a41e107214bb693a
Backdoor.Win32.Wollf.m malware suffers from a bypass vulnerability.
8c105c4719383bc2370e193839ad1e30f0bbf32bf36c1ea164e57a56c5c7e57e
Backdoor.Win32.Wollf.m malware suffers from having a weak hardcoded password.
643422b0c77d73d83930c3dad737b4297d8bea84ce50ddaf6a3f45bd3deae182
Backdoor.Win32.Jokerdoor malware suffers from a buffer overflow vulnerability.
b8c7fbd4b16710feb9236fd22748c462ef1285f25ffd43e6954b37e5f51481b7
TRIGONE Remote System Monitor version 3.61 suffers from an unquoted service path vulnerability.
28f7678973150b8a83c3d661a543bfddd3cf0df66211928cb36387ab3f2bd848
Computer And Mobile Repair Shop Management version 1.0 suffers from a remote SQL injection vulnerability.
e9bbd415359fbf78c50cb2437b871afe149fc9ed4ba37945a5d5ebc9902ef39a