OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
900a213103ff19a405e446327fbfcea9ec13e405283d87b6ffc24a10d9a268f5
Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.
0dd41d5c99202fa4387bb5b9db7ce55236fc913b65e3a9fb58f697d3480f14ef
Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.
8b696753a37506f0c3e8f542cb60e9f8198bb1bafd1a1dc97fbb9592becf31f3
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
5164ffb6eab228b4082d203c691906faa9ff32f09f41c3cebe6d941e03b0b9f2
docsify versions 4.11.6 and below suffer from a cross site scripting vulnerability. This vulnerability exists due to an incomplete fix for CVE-2020-7680.
660d129dcc87aa67615bb840ba7c6f92bff103f112e67bbd1690a0f2d2193057
Ubuntu Security Notice 4744-1 - Pasi Saarinen discovered that OpenLDAP incorrectly handled certain short timestamps. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service.
1be3627661b44eb2fdb469e07f4928ddf902429965f5d5e8266b6fa4f4fa4338
Ubuntu Security Notice 4743-1 - It was discovered that the GDK-PixBuf library did not properly handle certain GIF images. If an user or automated system were tricked into opening a specially crafted GIF file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service.
3284f45ef89382f29f69628c3443e2bdd6d347ec09e247b09817373c2f6ecc55
Red Hat Security Advisory 2021-0617-01 - The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
b8db13b799c67210e543cc369f41c6f3236051bfa0278dd95442d7fccc02c9c9
Backdoor.Win32.DarkKomet.irv malware suffers from an insecure permissions vulnerability.
e183b2062591943b3cee8f971a983b1c82409c08cd24be0401c482032b6ba256
Trojan.Win32.Pluder.o malware suffers from an insecure permissions vulnerability.
8a518eb33a34b0d04369bec7aea6fba26440c0d32ebb3bc64268cb45c10f197f
Trojan.Win32.Pincav.cmfl malware suffers from an insecure permissions vulnerability.
9b61243d0eead033e1d266780d4359c048cb707605ad00c4aa48fca3216049d0
Ubuntu Security Notice 4742-1 - It was discovered that Django incorrectly accepted semicolons as query parameters. A remote attacker could possibly use this issue to perform a Web Cache Poisoning attack.
407e701df74a66074b561d2e97205076ae3e598e31c63b2b56739a1cf7ebcd34
Red Hat Security Advisory 2021-0619-01 - Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection or to provide an encrypted means of connecting to services that do not natively support encryption.
0804580a5942e5cf829c14d22f6f8dec6f31b02d70cce8363d767ffcc9f6a9ff
Red Hat Security Advisory 2021-0618-01 - Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection or to provide an encrypted means of connecting to services that do not natively support encryption.
a5a187df0b460b9f48688c119706d2fe787ad16540715bb06db194e3716d0c03
Red Hat Security Advisory 2021-0620-01 - Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection or to provide an encrypted means of connecting to services that do not natively support encryption.
760e622f206e5b48dce30465bc9e5a827a851e7563d8b477a297b682a9934d9a
Backdoor.Win32.Ketch.h malware suffers from a buffer overflow vulnerability.
2abc44ddfa9d0b7263959ae5ff30bf3a21837b0e7e1c607d8886493459247df3
Backdoor.Win32.Inject.tyq malware suffers from an insecure permissions vulnerability.
bf6ea50de9c992e63ecd9bb1513eaba793264ba0d8a4f0670e8fd53b8afecfa1