Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.
15ce1a37b4cc175b07761e00acdcfa2c08f0d23d6c3ab9c97c464bd38cc5476a
Red Hat Security Advisory 2021-4012-01 - Red Hat support for Spring Boot provides an application platform that reduces the complexity of developing and operating applications for OpenShift as a containerized platform. This release of Red Hat support for Spring Boot 2.4.9 serves as a replacement for Red Hat support for Spring Boot 2.3.10 and includes security, bug fixes, and enhancements. For more information, see the release notes listed in the References section.
ad5a223d35cf4cbbf00fc0835b2b348db5c25cea1db02646b8b345b9c3a7462b
Ubuntu Security Notice 5125-1 - It was discovered that PHP-FPM in PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
d21525acd8302ff0a222bb83d5aaf4626c4e5306cce80cee1e2e72aac37eef61
This Metasploit module exploits an SID-based command injection in Sophos UTM's WebAdmin interface to execute shell commands as the root user.
e60408784254ddfee031c720b657d15c09df5d27e903311833f4a7f181588725
Backdoor.Win32.Prorat.ntz malware suffers from having a weak hardcoded password.
3242b7623dddcedfdaa1321d459bb30a8fe2211541d728a66a0771f0c38c14e3
Backdoor.Win32.Prorat.ntz malware suffers from a man-in-the-middle vulnerability.
b496833c9943b356b5e36c3d403fc166db28d62f58c8ad54909b0349ddab2d12
By removing the authentication header, an attacker can issue an HTTP request to the OMI management endpoint that will cause it to execute an operating system command as the root user. This vulnerability was patched in OMI version 1.6.8-1 (released September 8th 2021).
fdef0aef0e912b6be1749a8d91235a8ce5f95d8c64ee36efaa66917951a81206
Apple Security Advisory 2021-10-26-11 - tvOS 15 addresses bypass, code execution, denial of service, out of bounds read, and use-after-free vulnerabilities.
ebc2c5586dda25fcb5f1755935d9df8d22fe96d473608b04490304ef6ab1c4c2
Apple Security Advisory 2021-10-26-10 - watchOS 8 addresses bypass, code execution, denial of service, out of bounds read, and use-after-free vulnerabilities.
c5261977f132d063b33bfb8ae7574fbc455fc4460c7118b7e500205e5c5300a6
Virus.Win32.Ipamor.c malware suffers from an unauthenticated remote system reboot vulnerability.
84db975e201fa02c407f637fb81a3da8c99949352d8dcd96e7019bd77a849227
Backdoor.Win32.Antilam.14.o malware suffers from an unauthenticated remote command execution vulnerability.
e3ec579760331c3311245a4085bc3f661d2fcb2136789fb325b557865cc8541e
Apple Security Advisory 2021-10-26-9 - iOS 15 and iPadOS 15 addresses code execution, denial of service, out of bounds read, spoofing, and use-after-free vulnerabilities.
58d06760b57771902a8c3f6b64d1ccec806b30ce2ef20836de59cb0ce4327904
Apple Security Advisory 2021-10-26-8 - Safari 15 addresses bypass, code execution, and use-after-free vulnerabilities.
c1e6de671257272645ffee09d3fc62a44e6f863f26b481fc5ada1161911eb119
HEUR.Backdoor.Win32.Generic malware suffers from an unauthenticated open proxy vulnerability.
63970f0c1a53eb495ab4fe23cb39480889a373c2b844d7684e1533cf0dc070e3
Backdoor.Win32.Mazben.es malware suffers from an unauthenticated open proxy vulnerability.
173e6bf535ccd9b1964aaa19cd997d19c2e872f9160e2af34af09f1a13421313
Hostel Management System version 2.1 suffers from cross site request forgery and cross site scripting vulnerabilities. Original discovery of cross site scripting in this version is attributed to Kokn3t in October of 2020.
c25a1cf3e43fddf34b3dba5ae1ca94327edad0924a642a4cba70ea26c887ae6b
Backdoor.Win32.Hupigon.afjk malware suffers from bypass and code execution vulnerabilities.
e88083e56cc22443cfc05356ba29a0167905e994f2e84a847ee2ae8ae05f67e4
Apple Security Advisory 2021-10-26-7 - tvOS 15.1 addresses buffer overflow, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
afe34c7e18a2cd09d033c4966263d5f779242a387c7c97b8d682a440fffd3e78
Apple Security Advisory 2021-10-26-6 - watchOS 8.1 addresses buffer overflow, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
1ad304279232ddfec9d86b861d672344e79ab63f6240b126163d98fbe088873c
Backdoor.Win32.Hupigon.afjk malware suffers from a man-in-the-middle vulnerability.
6b2f003a1b543353ead8da56a0fc62fb2a653d2e3664170784d65781cd8aa71d
Backdoor.Win32.Hupigon.afjk malware suffers from a directory traversal vulnerability.
05d61f0a82f4efaed311b1b2abb9498038be8c7827ab8ec304b31ae59c970d88
Backdoor.Win32.Hupigon.acio malware suffers from an unauthenticated open proxy vulnerability.
eb96ad8d71f6c7c5b23f5e004070435ee69ec0fed3803691669fa6154b7986f0
WordPress Supsystic Contact Form plugin version 1.7.18 suffers from a persistent cross site scripting vulnerability.
3323df57b8923efdf98df1404c93ea1e5214d151574ad10b00cb85081bd9cc42
Apple Security Advisory 2021-10-26-5 - Security Update 2021-007 Catalina addresses code execution, integer overflow, out of bounds read, and out of bounds write vulnerabilities.
a875bea79cc57d5873eed09e410bb1b7743805f2fb64a3692f7e43a5398e8665
Backdoor.Win32.Hupigon.acio malware suffers from an unquoted service path vulnerability.
29b17d8a1dde1549c3b2a9f5bbbd0cadd035ff28ff9aa377cebbe1166a6cdfc7