OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
271b08010690b49343adf59627c6bb20
Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.
20d802d5a4db9ffc08379aea052bd26f
Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.
4a1a74b4a8cdcd5b15cbc7292a17fb9c
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
e73af4977c8caaec92130ddad04cb465
docsify versions 4.11.6 and below suffer from a cross site scripting vulnerability. This vulnerability exists due to an incomplete fix for CVE-2020-7680.
4f1f48238c4e1aa6fdf3106d9952a98f
Ubuntu Security Notice 4744-1 - Pasi Saarinen discovered that OpenLDAP incorrectly handled certain short timestamps. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service.
4c2ceedf78dd16293395750597aaf133
Ubuntu Security Notice 4743-1 - It was discovered that the GDK-PixBuf library did not properly handle certain GIF images. If an user or automated system were tricked into opening a specially crafted GIF file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service.
6f52348108b149927c94f10db41bea74
Red Hat Security Advisory 2021-0617-01 - The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
9adf362027211a202097ac9b321c3e5b
Backdoor.Win32.DarkKomet.irv malware suffers from an insecure permissions vulnerability.
bb262908599b4bf755bebcca1291acb8
Trojan.Win32.Pluder.o malware suffers from an insecure permissions vulnerability.
693734be11629f19fd9f6adf57b3e887
Trojan.Win32.Pincav.cmfl malware suffers from an insecure permissions vulnerability.
b237580a2e1707ad533440f0bedecdcc
Ubuntu Security Notice 4742-1 - It was discovered that Django incorrectly accepted semicolons as query parameters. A remote attacker could possibly use this issue to perform a Web Cache Poisoning attack.
279bc118d71b269f7d49c712f6ea35c4
Red Hat Security Advisory 2021-0619-01 - Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection or to provide an encrypted means of connecting to services that do not natively support encryption.
441a247ebe53b9c200314a189b47d535
Red Hat Security Advisory 2021-0618-01 - Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection or to provide an encrypted means of connecting to services that do not natively support encryption.
22ddef1ff00ed8f3e57df4f7e0151467
Red Hat Security Advisory 2021-0620-01 - Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection or to provide an encrypted means of connecting to services that do not natively support encryption.
126ba9419fcf4c9d22262fb9349a37ca
Backdoor.Win32.Ketch.h malware suffers from a buffer overflow vulnerability.
601ca1b3b09071a81ea903200e8a0487
Backdoor.Win32.Inject.tyq malware suffers from an insecure permissions vulnerability.
468cb862df6b63f6bcea90158cd0496c