Gentoo Linux Security Advisory 201401-5 - A memory exhaustion vulnerability in ISC DHCP could lead to Denial of Service. Versions less than 4.2.5_p1 are affected.
853ea473e76ead2e2bfba81cb1f8587f
Gentoo Linux Security Advisory 201401-4 - Multiple vulnerabilities have been found in Python, worst of which allows remote attackers to cause a Denial of Service condition. Versions less than 3.3.2-r1 are affected.
9388c3a826bad9d0f5b92b7964b28ae6
Gentoo Linux Security Advisory 201401-3 - A vulnerability in Nagstamon could expose user credentials to a remote attacker. Versions greater than or equal to 0.9.11_rc1 are affected.
0aee24638f820d2a7500be3f71a71156
Gentoo Linux Security Advisory 201401-2 - An error in Gajim causes invalid OpenSSL certificates to be accepted as valid. Versions less than 0.15.3-r1 are affected.
aec93aa01e9fb9e2e9f6167dac3d71ec
Red Hat Security Advisory 2014-0009-01 - Samba is an open-source implementation of the Server Message Block or Common Internet File System protocol, which allows PC-compatible machines to share files, printers, and other information. A heap-based buffer overflow flaw was found in the DCE-RPC client code in Samba. A specially crafted DCE-RPC packet could cause various Samba programs to crash or, possibly, execute arbitrary code when parsed. A malicious or compromised Active Directory Domain Controller could use this flaw to compromise the winbindd daemon running with root privileges.
62330fe55e47c54e94031b5f580ff469
Red Hat Security Advisory 2014-0008-01 - Ruby on Rails is a model-view-controller framework for web application development. Action Pack implements the controller and the view components. A flaw was found in the way Ruby on Rails performed JSON parameter parsing. An application using a third party library, which uses the Rack::Request interface, or custom Rack middleware could bypass the protection implemented to fix the CVE-2013-0155 vulnerability, causing the application to receive unsafe parameters and become vulnerable to CVE-2013-0155.
5ae558b60f8f872d3c4e01d807d8de86
Ubuntu Security Notice 2077-1 - It was discovered that Puppet incorrectly handled temporary files. A local attacker could possibly use this issue to overwrite arbitrary files. In the default installation of Ubuntu, this should be prevented by the Yama link restrictions.
747ca2671a13ca05263704ffdc6764c7
Debian Linux Security Advisory 2836-1 - Several vulnerabilities have been discovered in uscan, a tool to scan upstream sits for new releases of packages, which is part of the devscripts package. An attacker controlling a website from which uscan would attempt to download a source tarball could execute arbitrary code with the privileges of the user running uscan.
edd556852a1b81690ed84e8e111aacac
Debian Linux Security Advisory 2835-1 - Jan Juergens discovered a buffer overflow in the parser for SMS messages in Asterisk.
1402dec2014fec039c918a6268d83002
Gentoo Linux Security Advisory 201401-1 - Multiple integer overflow vulnerabilities in Libgdiplus may allow remote attackers to execute arbitrary code. Versions less than 2.6.7-r1 are affected.
839f4e5dcaeb7a69eee76ede6895e65d
Seagate BlackArmor NAS sg2000-2000.1331 suffers from a remote command execution vulnerability.
c75cf0e1be0e4c06b659cce7910bbb77
Seagate BlackArmor NAS sg2000-2000.1331 suffers from a cross site request forgery vulnerability.
ec9c70bcba2fb940132036c6f131db33
Open-Xchange AppSuite versions 7.4.0 and below suffer from script insertion vulnerabilities.
0d7b5b724a929d1f210d552707e091bc
Seagate BlackArmor NAS sg2000-2000.1331 suffers from multiple persistent cross site scripting vulnerabilities.
cc96999e5a6137b20df1eff11619b38c
An academic presentation on E-crime and National Preparedness. How governments and enterprises cope with the rising threat of malicious agents. This was presented at the University of Derby in England.
efe0654a2bc33ffdc090a003d8142abf
A presentation on Security Training and Awareness for Enterprises. This was presented at the University of Derby - Faculty of Business, Computing and Law.
cb1a42d21ebca5026ffec17491014265
An in-depth analysis of Business Continuity Planning, Disaster Recovery Planning and National Preparedness. This was presented at the University of Derby in 2013.
ba07254e87d3e7891bf926111d2e321b
A brief but comprehensive overview of the various Internet and Network Topologies. Presented at the University of Derby, in England at the Faculty of Business, Computing and Law.
d64e37c58c50571ddc58e1e17eadd64e
An Enterprise management module presented by Nicholas Lemonias at The University of Derby. A comprehensive view of Social Engineering and the immense effects to Society and the Human Dimension.
d4bf969fc724ba5230c82e0aaa5ad0cf
Seagate BlackArmor remote root exploit.
585773403fe5c80cce419819488fd6d0
WordPress Intouch plugin version 2.0 suffers from a cross site scripting vulnerability.
9fa903282bae2e7375cc1da540501c11
Joomla AceSearch component version 3.0 suffers from a cross site scripting vulnerability.
de9870c4a4567f211d16caf8f01e1472
An academic presentation on the scientific architectural composition of Intrusion Detection Systems and detection methodologies. This was presented at the University of Derby in England.
a07856ff6903e3163fa5139c468a54b2