I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
134481ae5ef934a411545330d1b22e768189c424a65db47058db0f7d9cf51e7d
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
e08e2af42535cd28422b0683f922dda1c5aa25589d440e7d865f107997dda95e
Hippo CMS version 10.1 suffers from an XML External Entity information disclosure vulnerability.
c467cf5987ff04b0981c61e79fceeeafe5e7597ea26c5cfec1e21868b1dd6c71
Hippo CMS version 10.1 suffers from a stored cross site scripting vulnerability.
baa214cc3d18abc9c36401bb6549b75564476366c5d76e56472cf63f81e56474
FreeBSD Security Advisory - A malicious client can negotiate SSLv2 ciphers that have been disabled on the server and complete SSLv2 handshakes even if all SSLv2 ciphers have been disabled, provided that the SSLv2 protocol was not also disabled via SSL_OP_NO_SSLv2. An active MITM attacker may be able to force a protocol downgrade to SSLv2, which is a flawed protocol and intercept the communication between client and server.
827e9ad8f6704f864f01a7b83b9a552d36a3e9f6236faf2b0176021619eee998
VBScan is a black box vBulletin vulnerability scanner written in perl.
50b8c3cf5f0259a2730560b37dcd93d7b6a81dd0fe12fb9e513ed77090111d08