Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
589f640058d6408ebbd695a80ebbd6e7bd99d8db64ecda253d27100dfd27e85b
Red Hat Security Advisory 2020-0134-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102, .NET Core Runtime 3.0.2, .NET Core SDK 3.1.101 and .NET Core Runtime 3.1.1. Security Fixes: dotnet: Memory Corruption in SignalR. Issues addressed include a denial of service vulnerability.
f869d8c44228bf0cb537cd6d5822c5d280a6cd2654a27d3d1223bbbdf2d1319c
WordPress Resim ara plugin version 1.0 suffers from a cross site scripting vulnerability.
e651608d5e3402eb3eb0d910d740e2145dfcd684707794959b960b189a658fed
Red Hat Security Advisory 2020-0132-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This release of Red Hat Process Automation Manager 7.6.0 serves as an update to Red Hat Process Automation Manager 7.5.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability.
d79d5fb27c4e6ac1b11fa6d2ad6bb8b94b8c534d590d9e400c1418318ea052e1
Red Hat Security Advisory 2020-0133-01 - Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model & Notation execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business. This release of Red Hat Decision Manager 7.6.0 serves as an update to Red Hat Decision Manager 7.5.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability.
a7ca0298e8834bc41c1f34dca26b3b07b8416df6141b74961c4c4541cbf0f6f1
Red Hat Security Advisory 2020-0130-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102 and .NET Core Runtime 3.0.2. Security Fixes: dotnet: Memory Corruption in SignalR. Issues addressed include a denial of service vulnerability.
459b14ca4d33e258947b6b62d44a5953684082327f9aec285f4a54e04eb882a9
Red Hat Security Advisory 2020-0124-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a code execution vulnerability.
71e2022c05e5a03b62e2845a453bc675f5131251199607d15d7db5a44fc3b703
Red Hat Security Advisory 2020-0122-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a deserialization vulnerability.
bdab1bfe4a84d3390eb90e48e33251d4b03b5a8842fcbd0f79be5056b303984f
This is an nmap nse script to test for the path traversal vulnerability in Citrix Application Delivery Controller (ADC) and Gateway.
078997b326852f40549231510ea278d6e98e39608b88703f2a45f6a9734b1d28
Red Hat Security Advisory 2020-0128-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a deserialization vulnerability.
5617d29628ffce51248eb0b2e505408cf48cbd53d7e49c4947c1db6e437c17a5
Red Hat Security Advisory 2020-0127-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.
44614054f887702a1b73ddac192a945c34a21ce122434fee39ad630000950f61
Red Hat Security Advisory 2020-0120-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.
8f148e2051df09d59bcec8ed2a4f61c9caa5b20001632d894c56ee8b55225df1
Jenkins Gitlab Hook plugin version 1.4.2 suffers from a cross site scripting vulnerability.
38931217cabd4d17c01cf04d878ac4d8c49d23973f783f5ba2fd442676454822
Red Hat Security Advisory 2020-0123-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.
6e1d9ec6178b22b026cde8325f51bd2f5e140aed5e63f063575db0d4085c4fc3
Proof of concept exploit for the Microsoft Windows CurveBall vulnerability where the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. ECC relies on different parameters. These parameters are standardized for many curves. However, Microsoft did not check all these parameters. The parameter G (the generator) was not checked, and the attacker can therefore supply his own generator, such that when Microsoft tries to validate the certificate against a trusted CA, it will only look for matching public keys, and then use then use the generator of the certificate.
d9f0b10579f568648f3f6770ab1c8d5cbdf6c5bf56bd77131137a69282cb97e2
This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.
dbcf6e21e9b280b90adc6d4dc06dc38feadb3dd70aef54f167d5df5417901041
This Metasploit module exploits a denial of service vulnerability in Tautulli version 2.1.9.
fbb3636b00c64236d925b46f5ec620bfafe94e8df1864693a95b713266ef3d2c
Online Book Store version 1.0 suffers from an arbitrary file upload vulnerability.
29a1415af9bd66ab7d42e7bc62b1ff4cbaf0999ef20d117cdf573492b7c6c2b5