I2P 0.9.33

Facebooktwittergoogle_plusredditpinterestlinkedinmail

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Powered by WPeMatico

Facebooktwittergoogle_plusredditpinterestlinkedinmail

Lynis Auditing Tool 2.6.1

Facebooktwittergoogle_plusredditpinterestlinkedinmail

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Powered by WPeMatico

Facebooktwittergoogle_plusredditpinterestlinkedinmail

NEC Univerge SV9100/SV8100 WebPro 10.0 Remote Configuration Download

Facebooktwittergoogle_plusredditpinterestlinkedinmail

NEC Univerge SV9100/SV8100 WebPro version 10.0 suffers from a remote configuration download vulnerability. The gzipped telephone system configuration file ‘config.gz’ or ‘config.pcpx’ that contains the unencrypted data file ‘conf.pcpn’, can be downloaded by an attacker from the root directory if previously generated by a privileged user.

Powered by WPeMatico

Facebooktwittergoogle_plusredditpinterestlinkedinmail