Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
3f5c273bb887be4aff11f4d99b9e2e52d293b81ff4f6302b730161ff16dc5316
OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
ebeb5481d696cf83c21c5dfbecce6ab5dcc73df1a08573ef257f2f6fe10f6214
SAP NetWeaver KERNEL versions 7.0 through 7.5 suffer from a buffer overflow vulnerability.
d10889cc653455a7307ca7302ef29910c5198f4c90b852a99108147b33e0a1d4
SAP EP-RUNTIME version 7.5 suffers from a denial of service vulnerability.
3f0975ddf76e930f8e4b83447cfd991b8747cc460b16cad70cfad5fd2608ce72
An attacker can send a special request to the SAP Adaptive Server Enterprise and crash the server. Version 16 is affected.
bb04162b039d0e5cc13c114a213b887ada2d65e992d806d460a0fd4927e03c50
LanSpy version 2.0.0.155 local buffer overflow exploit.
8179ef586b1b73bce9a65bad1875e744227dfa59f122b1f5284ec3082f459ce9
Analysis of Tuleap versions 8.18 and below remote SQL injection, cross site scripting, and insecure direct object reference vulnerabilities.
df4bf3135788d5d8e84ab9da210f008b0d2f9f9c0eb2dc4c3d5a2a9548eeacb9
Windows suffers from an elevation of privilege vulnerability in the User Profile Service.
97b457125a6643a868963d6ea9692fdd8632b5b0be62f70275a4468c594484f5
The fix for CVE-2016-3231 is insufficient to prevent a normal user specifying an insecure agent path leading to arbitrary DLL loading at system privileges.
8e920030b310b6dcf311c06b2b2e41ac897452fca01c6548f5350cbbaaf2d80c
The Windows DeviceApi CMApi PiCMOpenClassKey IOCTL allows a normal user to create arbitrary registry keys in the system hive leading to elevation of privilege.
9ed3cfad5f45a4826c3f4edfa4a900d6907941eae3d340562b9af0050fae92ae
The Windows DFS Client driver and running by default insecurely creates and deletes drive letter symbolic links in the current user context leading to elevation of privilege.
2638bfd1a02a94d1b2488c6813b4f4ecdb4390e08d2e42f584071f01073adce4
The Windows DeviceApi CMApi PnpCtxRegOpenCurrentUserKey function doesn't check the impersonation level of the current effective token allowing a normal user to create arbitrary registry keys in another user's loaded hive leading to elevation of privilege.
2e1231f4bf4a445eede4130d674c86c027caab38c9470a664b4e7bdf8a7fe1ea
93 bytes small Windows x64 WinExec() shellcode.
f8c017fef06f26bdc3001614059f11d479998e825386460449e8e6af51132ceb
493 bytes small windows x86 keylogger reverse UDP shellcode.
f11bedadec09c342e415dbbb48ae8a0d67b64276e604861a74ffc3513beb6137
Windows x86 afd.sys privilege escalation exploit that leverages the issue outlined in MS11-046.
db373fd42b1c54d05f5950ab5e52c93d6d4295fd00339cb1fe9ad414a9034018
This is a whitepaper discussing web security vulnerabilities. Written in Turkish.
b2ce8a86af38939099135b17282b82b0cb706186a89434a63685fd266848f998