-
## CVE-2018-14465 - High Severity Vulnerability
Vulnerable Library - platform_external_tcpdumpandroid-platform-12.1.0_r30
Library home page: https://github.com/aosp-mirror/platform_external_tcpdump…
-
## CVE-2018-14462 - High Severity Vulnerability
Vulnerable Library - platform_external_tcpdumpandroid-platform-12.1.0_r30
Library home page: https://github.com/aosp-mirror/platform_external_tcpdump…
-
## CVE-2018-14880 - High Severity Vulnerability
Vulnerable Library - platform_external_tcpdumpandroid-platform-12.1.0_r30
Library home page: https://github.com/aosp-mirror/platform_external_tcpdump…
-
## CVE-2018-14463 - High Severity Vulnerability
Vulnerable Library - platform_external_tcpdumpandroid-platform-12.1.0_r30
Library home page: https://github.com/aosp-mirror/platform_external_tcpdump…
-
## CVE-2018-14468 - High Severity Vulnerability
Vulnerable Library - platform_external_tcpdumpandroid-platform-12.1.0_r30
Library home page: https://github.com/aosp-mirror/platform_external_tcpdump…
-
## CVE-2018-14469 - High Severity Vulnerability
Vulnerable Library - platform_external_tcpdumpandroid-platform-12.1.0_r30
Library home page: https://github.com/aosp-mirror/platform_external_tcpdump…
-
## CVE-2018-16229 - High Severity Vulnerability
Vulnerable Library - platform_external_tcpdumpandroid-platform-12.1.0_r30
Library home page: https://github.com/aosp-mirror/platform_external_tcpdump…
-
## Description
We need to run `tcpdump` to debug a testground test. Capturing a few notes on how to do this here:
## How to do it (hackish)
With the docker runner, it is possible to use the `…
-
This replaces travis-ci/travis-ci#4338.
The original text by @mcr follows
---
need tcpdump to do comparisons on packets emitted by code in test harness.
-
Hi,
Could you add another feature to this rootkit so that it can hide its packets from tools like wireshark/tcpdump?