GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
ae2248d9e78747cf9c469dde81ff8f90b56838b707a0637f3f7d4eee90e80234
F-Secure Radar suffers from a persistent cross site scripting vulnerability.
405d16c1c6d3d3c8996935c51ed4f17c59f171f479ccfbf38ad323ede990f845
Tenda AC15 suffers from a buffer overflow vulnerability that allows for code execution.
9b6074a77708e6964aad699e022fbcd44c9088c3b71e6dcc7d9f2dbe8795be53
UserSpice version 4.3 suffers from a remote blind SQL injection vulnerability.
7f0a1db11169b6b1e5689e60739f1594659afd51570215db70a1a22c0e124f32
Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module versions prior to 4.25 suffers from a denial of service vulnerability.
16a8f6a4cbac0980db97586ac9521fc1517703378293eebab8f22e877006a684
F-Secure Radar suffers from an open redirection vulnerability.
050e4673a857d9f0b03eb5e9f5c121c5632160f1b975833ab12e4f6925c3aff1
Slackware Security Advisory - New irssi packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
51f05fb33547c62b984e80091ba113e675e6271ca2bbbdda2e71532693142957
Debian Linux Security Advisory 4115-1 - Several vulnerabilities have been discovered in Quagga, a routing daemon.
42318d99958702d880d1ff84517239a4ac6765bfd5cbf9f862c27479cfdaacca
JBoss Remoting version 6.14.18 suffers from a denial of service vulnerability.
800ab4fbff48ab9f4485da231949f46c62f276b40be68683a82a76858da06fc6
Tejari suffers from an arbitrary file upload vulnerability.
c8a460c34469c263c89bbfbf568a8ae787c8691567ec7508647682a710f781ca
EPIC MyChart suffers from a remote X-Path injection vulnerability.
925507d6deecf41096be20d78e097e7fa5b2291dc91dcca5bcb5be6746edfd7e
Whitepaper called Zero Day Zen Garden: Windows Exploit Development Part 5 [Return Oriented Programming Chains].
6d8597540e4436f9ba883712782db8f86d798f6a6bb3f569a8e393aea570048c
Joomla Kubik-Rubik Simple Image Gallery Extended (SIGE) component version 3.2.3 suffers from a cross site scripting vulnerability.
4ca7480a585108b9ef6e5b00a1461493f72835dd1c4a543df77ee3d7df621697
Twig versions prior to 2.4.4 suffer from a server-side template injection vulnerability.
41d9e8b976dcfef5e66dffbc35eb389cc32e03612fb95d4296ee3076d1589749
TV Video Subscription suffers from a remote SQL injection vulnerability that allows for authentication bypass.
dd5d0bb325041f3861fe29a8743a24d6bc0392a1badf9c45368714c8ac5c7dee
Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.
7384fa14e6cebc86488040877fc0bfd50868e969f0fa05178cef0116e4116225
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
617e83b6e20b03aa7d5e05a980d3cb6d2810ec18a6f15a36bf66c81c9c0a2abb
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
629efa33d684b61f0d9d5fe8ae1d3fe87a94dae5897cf90d5733af1552a55498
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
63ee1b034f816db69c3f11af3c2c6ea88416553c44be7dc5d2d9b32c66a880f0