SaaSHub helps you find the best software and product alternatives Learn more β
Cve-2021-3449 Alternatives
Similar projects and alternatives to cve-2021-3449
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
mkcert
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
-
traitor
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
NOTE:
The number of mentions on this list indicates mentions on common posts plus user suggested alternatives.
Hence, a higher number means a better cve-2021-3449 alternative or higher similarity.
cve-2021-3449 reviews and mentions
Posts with mentions or reviews of cve-2021-3449.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-03-25.
-
CVE 2021 3449 exploit method
I am trying to understand how to use the information in https://github.com/terorie/cve-2021-3449 to check in my server which has UI and supports TLS 1.2. It does not support renegotiation though but I still wanted to check with exploit to verify whether or not, it is impacted. The link mentions βgo run . -host host:portβ but I am not able to figure out how to use it as there seem no script to run. Any help would be appreciated.
- CVE-2021-3499 OpenSSL denial-of-service PoC
-
Do these vulns affect Fortigate devices? CVE-2021-3449 - CVE-2021-3450
FortiOS(web gui/sslvpn) is "vulnerable" to CVE-2021-3449, tested using POC https://github.com/terorie/cve-2021-3449 Impact is basically limited to filling up your crashlog, but if you have fortigates your used to that :)
-
OpenSSL Security Advisory [25 March 2021]
Does anyone have a PoC? Someone posted this on Github but the git log is squashed and doesn't show the changes they made. https://github.com/terorie/cve-2021-3449
-
A note from our sponsor - SaaSHub
www.saashub.com | 28 Apr 2024
Stats
Basic cve-2021-3449 repo stats
4
225
0.0
over 2 years ago
The primary programming language of cve-2021-3449 is Go.
Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com