I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
ca314bec4e683919f75c4734e9c4190f9ac070ccc76e40b7d104404ade5b736b
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
677d97a829d9e05f664c82eb0372e870d5f6e9501ccee20130dfde4014bd5084
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
fdaaabd9e2d159af7677b8012a1ac6e0230e357918707732d7ca9d8b1156c135
Secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.
580cca2d7b753cf793cd2a4d151a3efc7058eb942efc4db688b1427fd6e53cc7
ipset-bash-completion is programmable completion code for the bash shell, to support the ipset program (netfilter.org). It allows you to interactively retrieve and complete options, commands, set names, types, and members.
cdac5e50743056a686c528abf56c57bd2b390812de611eef34e90b44230c35bf
X2Engine versions 4.1.7 and below suffer from an unrestricted file upload vulnerability due to poor use of a blacklist.
f7f0d377cb996b5e9e79057b4c8a18347d9ead55c06712219f6e0ee4196c0f23
X2Engine versions 2.8 through 4.1.7 suffer from a PHP object injection vulnerability.
ce312d6d96cd4f148fb2b5cecb97b68cf00a123ef5c0ba90f41a768e2c83ad31
Get Simple CMS version 3.3.3 suffers from cross site request forgery, clickjacking, and various cross site scripting vulnerabilities.
7faa651d8fdd22b54845204b42b632cb90d115af238c947e3a71f13b591e3ba9
Modern virtualized service infrastructures expose attack vectors that enable attacks of high severity, such as attacks targeting hypervisors. A malicious user of a guest VM (virtual machine) may execute an attack against the underlying hypervisor via hypercalls, which are software traps from a kernel of a fully or partially paravirtualized guest VM to the hypervisor. The exploitation of a vulnerability of a hypercall handler may have severe consequences such as altering hypervisor's memory, which may result in the execution of malicious code with hypervisor privilege. Despite the importance of vulnerabilities of hypercall handlers, there is not much publicly available information on them. This significantly hinders advances towards securing hypercall interfaces. In this work, the researchers provide in-depth technical information on publicly disclosed vulnerabilities of hypercall handlers. Our vulnerability analysis is based on reverse engineering the released patches fixing the considered vulnerabilities. For each analyzed vulnerability, they provide background information essential for understanding the vulnerability, and information on the vulnerable hypercall handler and the error causing the vulnerability. The researchers also show how the vulnerability can be triggered and discuss the state of the targeted hypervisor after the vulnerability has been triggered.
7d90e4303005df5faec215e49bc919db7d1f13c6388d0b7871bb45c646e2e92a
xcode-select on Darwin kernel version 13.4.0 suffers from a buffer overflow vulnerability.
2cfb55fd81aab106c5b8d98a5ff07944ed05f81d33482b0074aa0884859772ad