The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.
9fba3413d071ea4506dfb27d16d987040a8a64ccb8db8c8a444ff7163b253ab4
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Linux release.
ad773f00081964afeb212862d066a18bb49f2b49541399b0034b245d1e9f7ad1
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.
d8e296cc09908f7df9970ac6f701191bf7ccdff628d95194196a58689f8186be
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
0addf3ea05c5e5dc297d1af09dda7787a731865418a34b5a88cb770c7314b12f
Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
f61f5165366f8c7eb658d2fc87af519a31604be754970c14e58cbbaff8471a84
WordPress MiwoFTP plugin version 1.0.5 cross site request forgery arbitrary file creation exploit.
52e296db0149040e684713523900dd03290ff51cb9294f283bbdac2f84f82b1b
WordPress MiwoFTP plugin version 1.0.5 suffers from cross site request forgery and cross site scripting vulnerabilities.
6fe2ba764f853d15dbf8c1acaf66c048bf99a7a62d7365810f4468505cd14a87
WordPress MiwoFTP plugin version 1.0.5 cross site request forgery arbitrary file deletion exploit.
4c18229db5353eb6fcc3bf6caff9579754c718b77e2c07642a6a654d20bb0bc0
Hancom is an office suite developer in South Korea. The HanWord processor (also called Hangul a.k.a HWP) is vulnerable to an integer overflow when assigning a long paragraph size value.
cf7d1f1a6c807bdd214b174094250d2fd4dc277318aef8dd830b8c0e04892e29
This bulletin summary lists eleven Microsoft security bulletins for April, 2015.
4bee21f20df6cf09849086233d8866a94985b72ad4718c679dc88f899762840d
This whitepaper focuses on a method of stealing data as a client side script's identifier (variable or function name). The author describes these attack techniques / browser vulnerabilities and then discuss countermeasures for these issues.
8bfa6b14e13a3f906c5514c4e8df9d61d08c0fdbec7c3caccf3b7b25358569b0
Various security issues relating to symlink attacks and race conditions with Abrt and Apport are documented here.
5d34863098436ca2b737a516dbf202b5b13e18f665c091f7e9911d2b18bd94f7
Panda Gold Protection 2015 version 15.1.0 suffers from an authentication bypass vulnerability.
8279b24bbe87319af019d92f5fa713ba33bc5b2f819599f5d4bde53a1a8c3d70
Panda Global Protection 2015 version 15.1.0 suffers from an authentication bypass vulnerability.
b0ce784ce3941c3e2211727da49529f55f628d6bc53a8a07e077f4926fefc997
Panda Antivirus Pro 2015 version 15.1.0 suffers from an authentication bypass vulnerability.
78e5eb24225a62312d8ad8f761249bc6322d0fa2d403267061a8cea8d3736af3
Panda Internet Security 2015 version 15.0.1 suffers from an authentication bypass vulnerability.
07f2adae46a6c1ae746b474e2de638331124c2f7f405eef6cd9b27bda87dcdff
Linux Apport/Abrt local root exploit.
86450ad50a81df27c58911bc2fe3cf1d8a226ce7476c4db37f56410a0c5dd0ee
Fedora abrt race condition exploit. It should be noted that it can take a few minutes to win the race condition.
053cff5ebe269542da78be60035335973d047e4f044f09a8b85e9951aa872b69
Samsung iPOLiS version 1.12.2 ReadConfigValue heap spray remote code execution exploit.
0711778b9458d24557ca6d35231417c8a4d53813e7f0f0585e836744d6f7e563
This bulletin summary lists one bulletin that has undergone a major revision increment for April, 2015.
7da9ee743634872568c9f0049560794727c55ff9fbe8981d8f08e8652847daa0
log2space version 6.2 suffers from a cross site scripting vulnerability.
93fe9b60690ee2b8d2fde351a73fed40e65ab3beef066e5968c665b3c5ff8b02