I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
e8c55b17b2066d8eab82bc407128f1f0366530c5429a1413ea0cbf40f922d532
Red Hat Security Advisory 2020-5325-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
075f8bf44f6f811a575e079675877d4ed64e3a9e786f7f3b20c3d1dd5948af59
Ubuntu Security Notice 4659-1 - It was discovered that a race condition existed in the binder IPC implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered that legacy pairing and secure-connections pairing authentication in the Bluetooth protocol could allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. A physically proximate attacker could use this to impersonate a previously paired Bluetooth device. Various other issues were also addressed.
9a0f9a2f26c0dfddf7589768d4e433696e87ba393c23e7f724162684bf154fac
Ksix Zigbee devices playback protection bypass proof of concept exploit.
bb9a8e2468e16c9c046ad0e269e61fe86d1ca52524c1567d20e1f16a03171b9b
Ubuntu Security Notice 4658-1 - It was discovered that a race condition existed in the binder IPC implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered that legacy pairing and secure-connections pairing authentication in the Bluetooth protocol could allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. A physically proximate attacker could use this to impersonate a previously paired Bluetooth device. Various other issues were also addressed.
4ed9af991deebf6c3244cf4de2f7dbb22af21f0a04f28319291a7673feba8d42
Simple College Website version 1.0 suffers from a local file inclusion vulnerability.
b44cab5ff0eba5512a4197a21f1083bfd568a5df97fcbdc76ab70a201b0c942b
Red Hat Security Advisory 2020-5317-01 - PostgreSQL is an advanced object-relational database management system.
ff42bdc589414c4c39251b278536e7e02bf8d096ee1d7da194fa9ce93c45d1ab
Car Rental Management System version 1.0 suffers from local file inclusion and remote SQL injection vulnerabilities.
6c3a9ab09332b9462a85ae9a62c07b1da59b5a0539c1fe4f64d0e752f209eb9f
Red Hat Security Advisory 2020-5316-01 - PostgreSQL is an advanced object-relational database management system.
da20a6c71935604f49a4c1020cf1b9d1d94b121eb7d1606289926dbe8cd03a84
WordPress WP-FileManager plugin version 6.8 remote code execution exploit.
749e41357c44162f47f36ada564f71b7a2871f5903c2a54b740a9a3b2ffd69e1
ChurchCRM version 4.2.1 suffers from a persistent cross site scripting vulnerability.
89eb66ca076542eadc0c75e2edf4b228b61b94104a54f8955a66afb56277f57d
ChurchCRM version 4.2.0 suffers from a CSV formula injection vulnerability.
f67f1dd8bf64323fcf6487439b5c3c64bfe3deb0e615cbd5f582f7d378c8e79a
Online Voting System Project in PHP suffers from a persistent cross site scripting vulnerability.
8d46647b973dde1d7708f57f4e2f9e6508f23d1e88492b179bfcb273da46303a
NewsLister suffers from a persistent cross site scripting vulnerability.
dac870b2b6b124c52b7dcbc1e774e521ab7698707a192a9d2021f5c15e180d92
EgavilanMedia User Registration and Login System with Admin Panel version 1.0 suffers from a persistent cross site scripting vulnerability.
d4c4ad574e42e7dc7a62ab1e46b0937967f0769fa0feaef12568f54130a45e3b
DotCMS version 20.11 suffers from a persistent cross site scripting vulnerability.
ea4c95c712c1539dc33fc454c72ff4fab1fe771eea8ff2917a118724bee5bb95
Local Service Search Engine Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
8d2b5de89fa287b36960beba7e33a9e6c7198d12658e7125760060afa06ffbdd
Online News Portal System version 1.0 suffers from a persistent cross site scripting vulnerability.
07ffe6e0638dabe2fee7c4cf011f5f206a5edee24d5c3862518b4dd7c0554ef8
Bakeshop Online Ordering System version 1.0 suffers from a persistent cross site scripting vulnerability.
3784cebb62d376c694895409b47d31a849e9a814d404526037576f2d7d17aafd
PRTG Network Monitor version 20.4.63.1412 suffers from a persistent cross site scripting vulnerability.
34d12ce1f4350e907e85a42b144a351534805cb19413c65edf087d127e2065c5
WonderCMS version 3.1.3 suffers from an authenticated remote code execution vulnerability.
09b8e41fb0a82f2d2ef29e2aa308db43a52c99cd202761dfd2ca36db7d3b27af
WonderCMS version 3.1.3 suffers from an authenticated server-side request forgery vulnerability that allows for remote code execution.
d34e352ab26c4a7204cf313e0156a894e533fda770aa579e75d01803563cebbd
Pharmacy Store Management System version 1.0 suffers from a remote SQL injection vulnerability.
33b1163a299ecb50d0a3a32e500ef5b1bfea22b201cf080785819fde3886271c
ILIAS Learning Management System version 4.3 suffers from a server-side request forgery vulnerability.
81cad560ce068e72fc044a01aa5e0f0de59690f83ae6b4da6f7f3bca1bada114
Student Result Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
68a87e5cd11862c6d942b438b44c2fb1db4d6412645a7a5bde6b93e4c2053605