PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
c82a337b3f230518ff1c9c6fb5686c1db0d3a89dd99dac741d31afdd13439abc
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
11e0a3d09e79cf8776042e084c15d8340d11b65d1681c0f9e97acaca48f4de28
Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
006e122a1973bb12b92eb79622ebc93716ec0766a6987e73b4ae5387509e5ade
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
e921fb072085a5654d899949bb561d0687f4819f7b63ba35777bb949a9b6b9c1
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
973cc37b2f3597e4cf599b09e604e79c0fe5d9b6f595a24e91ed0662860b4ac3
Netgear's ProSafe NMS300 is a network management utility that runs on Windows systems. The application has a file upload vulnerability that can be exploited by an unauthenticated remote attacker to execute code as the SYSTEM user. Two servlets are vulnerable, FileUploadController (located at /lib-1.0/external/flash/fileUpload.do) and FileUpload2Controller (located at /fileUpload.do). This Metasploit module exploits the latter, and has been tested with versions 1.5.0.2, 1.4.0.17 and 1.1.0.13.
21b61eacb45384fca46646a93d57a232dc9d4a63ea542dc6fb29807e1a4dc643
The Adreno GPU driver for the MSM Linux kernel contains a heap overflow in the IOCTL_KGSL_PERFCOUNTER_QUERY ioctl command. The bug results from an incorrect conversion to a signed type when calculating the minimum count value for the query option. This results in a negative integer being used to calculate the size of a buffer, which can result in an integer overflow and a small sized allocation on 32-bit systems.
11c959c3433bd2e4a4a0b93cec8f7ba66f5dab8a114dc0cadb5fc6c6bc5f818f
Fiyo CMS version 2.0.6.1 suffers from multiple cross site scripting vulnerabilities.
94a75418a58f9a444db29b3522a8e6934a1b2690ac8c1f92fe79a33def69eaf6
This script exploits er, unsanitized env var passing in ASAN which leads to file clobbering as root when executing setuid root binaries compiled with ASAN. It uses an overwrite of /etc/ld.so.preload to get root on a vulnerable system. You can supply your own target binary to use for exploitation.
3f14643d1c039904bc9db24702fe18f67c6de2c6f848f3e50ab2d61c07de8423
Red Hat Security Advisory 2016-0309-01 - OpenStack Image Service provides discovery, registration, and delivery services for disk and server images. The service provides the ability to copy or snapshot a server image, and immediately store it away. Stored images can be used as a template to get new servers up and running quickly and more consistently than installing a server operating system and individually configuring additional services. An authorization vulnerability in OpenStack Image service was discovered, which allowed image-status manipulation using locations. By removing the last location of an image, an authenticated user could change the status from 'active' to 'queue'. A malicious tenant could exploit this flaw to silently replace owned image data, regardless of its original creator or visibility settings. Only environments with show_multiple_locations set to true were affected.
ea535561c42b5bd9d777446c42c01a808de586a69aa8c2f4acfa2d8dbcbca27b
Slackware Security Advisory - New libssh packages are available for Slackware 14.0, 14.1, and -current to fix a security issue.
02c7441014bdd9e0f73350f6d47e292e57e03e9a03b3a1d62206ffdf4d7d9a4f
Debian Linux Security Advisory 3495-1 - Markus Krell discovered that xymon, a network and applications monitoring system, was vulnerable to incorrect data handling, incorrect permissions, and various other security issues.
53a0dba24a61cd8d8b2c08030f630e1b8f8ff722b419c80f9a8acbed492ce294
Debian Linux Security Advisory 3498-1 - Multiple security vulnerabilities have been found in the Drupal content management framework.
d05d759600212f327451853cf50f35c896fca22c35d1590b3a6cb5d8b118e93b
Debian Linux Security Advisory 3499-1 - Multiple security vulnerabilities have been found in Pillow, a Python imaging library, which may result in denial of service or the execution of arbitrary code if a malformed FLI, PCD or Tiff files is processed.
8b910f6671c0e4d3abcf87002c5d7014c4463092d27ad1d60c61cc97b88fdeed
Debian Linux Security Advisory 3496-1 - It was discovered that php-horde-core, a set of classes providing the core functionality of the Horde Application Framework, is prone to a cross-site scripting vulnerability.
fb2e808e2bc1b55e3a678a6bd92bf163b812a242063669eceb2cf4d1b24e361d
Debian Linux Security Advisory 3497-1 - It was discovered that php-horde, a flexible, modular, general-purpose web application framework written in PHP, is prone to a cross-site scripting vulnerability.
0c1655a872704facecb22f051bb6c9eea16caf3f0e87ad0f84b0f0de433a969d
Debian Linux Security Advisory 3494-1 - Two SQL injection vulnerabilities were discovered in cacti, a web interface for graphing of monitoring systems. Specially crafted input can be used by an attacker in parameters of the graphs_new.php script to execute arbitrary SQL commands on the database.
97808cf3529875d4bcd54cfdad0de8a01c508d89587d889ac02eab545d374b0b
Red Hat Security Advisory 2016-0308-01 - RabbitMQ is an implementation of AMQP, the emerging standard for high performance enterprise messaging. The RabbitMQ server is a robust and scalable implementation of an AMQP broker. A cross-site scripting vulnerability was discovered in RabbitMQ, which allowed using api/ path info to inject and receive data. A remote attacker could use this flaw to create an "/api/..." URL, forcing a server error that resulted in the server returning an HTML page with embedded text from the URL. A response-splitting vulnerability was discovered in RabbitMQ. An /api/definitions URL could be specified, which then caused an arbitrary additional header to be returned. A remote attacker could use this flaw to inject arbitrary HTTP headers and possibly gain access to secure data.
5afd04f5b678cbda103db43bf170342e4a739b7757cecdcccbbf96e357abaa44
A crash due to a use-after-free condition can be observed in an ASAN build of Wireshark (current git master), by feeding a malformed file to tshark.
aa70c051da88d6df887378a4bee75c1f9831e1bd674b47c6a648173a1efc04f2
95 bytes small Linux/ARM connect back to ip:port with /bin/sh shellcode.
862488148cff154d3e46b87741bb714cd23a1ee3beb98ca891065e92e484b066
WordPress More Fields plugin versions 2.1 and below suffer from a cross site request forgery vulnerability.
906328027e2d34e5ffabc680e80bf4a58c0cad693359ae0eccd0ee17d378a5d2
GpicView version 0.2.5 buffer overflow crash proof of concept exploit.
d02a27f6326edac3336bb36dac367b061870cccfa1778239241bf20194b30a07
Fing version 3.3.0 suffers from a persistent mail encoding vulnerability.
7b2b2a6aa9e6305baa1e2225868b94e22b5f9306572b25675ef6534b0e5fb65a
WP Good News Themes suffers from a client-side cross site scripting vulnerability.
2f6dbc8068ac0fc495a40430881c904a267917e4664027d378ea34d6fa60b893
The Call For Papers for CISTI'2016 Workshops has been announced. It will be held in Gran Canaria, Canary Islands, Spain between the 15th and 18th of June 2016.
7cba86d53aa3d2df673016e9869589db3f8b697f4d2c7f290534c602dbac7c81