GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
c2d93d305ecbc55939bc2a8ed4a76a3d
F-Secure Radar suffers from a persistent cross site scripting vulnerability.
735e4f84539544c9590551d80572111e
Tenda AC15 suffers from a buffer overflow vulnerability that allows for code execution.
72acd8ec6104f2a685fa1d83a2a72be2
UserSpice version 4.3 suffers from a remote blind SQL injection vulnerability.
13caf2403db65bfa3070b3c15b8bcaad
Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module versions prior to 4.25 suffers from a denial of service vulnerability.
edb7a974116ad1ad288a230017f3c9f2
F-Secure Radar suffers from an open redirection vulnerability.
2ec659aca50614acbd9213f3a4c40a12
Slackware Security Advisory - New irssi packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
7d4d9c11ddabdc7a302f7f7dc1dce8ba
Debian Linux Security Advisory 4115-1 - Several vulnerabilities have been discovered in Quagga, a routing daemon.
19d97fa7ebec5bb1ff560eb626ce1667
JBoss Remoting version 6.14.18 suffers from a denial of service vulnerability.
0185cc99e3b3766f3d03852f9916e36d
Tejari suffers from an arbitrary file upload vulnerability.
fe73773199d81547dabdd4fe82e4b5d6
EPIC MyChart suffers from a remote X-Path injection vulnerability.
cbebbe58a4e9576ded18ba20d7a32aac
Whitepaper called Zero Day Zen Garden: Windows Exploit Development Part 5 [Return Oriented Programming Chains].
3e997bff18215da9f06ce4af9ce36ef1
Joomla Kubik-Rubik Simple Image Gallery Extended (SIGE) component version 3.2.3 suffers from a cross site scripting vulnerability.
c550928ba8ea836cad34edbe240f135d
Twig versions prior to 2.4.4 suffer from a server-side template injection vulnerability.
f8c2f2e2c464c7a35f871f4ab21a5af4
TV Video Subscription suffers from a remote SQL injection vulnerability that allows for authentication bypass.
08229e369f470dadc55f2782e4722939
Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.
13794fb4dc8f45cff106a1c26af80d7b
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
0ed72192cca00bea63ffd5463bacbdd5
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
d36668322cb0b1ceba0bbd82a6653b22
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
ffd97f7c14b17b8bfb04d0ea643ee64e