PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
9821829160776c1110e954e17146652831f271e4a5eb3f9cd7e682f7c9cfd952
Elastix versions 2.5.0 and below suffer from a remote blind SQL injection vulnerability.
7ecb3243823f79f10e1a25afc831be42c8aaa2e67fe2f00f3ecc649b781e0422
The call for papers for H2HC 12th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 22nd through the 27th, 2015.
fafb116d98de179666ec005b4b71bb1a933682a7d03b51312cdb609f7f38b082
Betster version 1.0.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
e161b508a74a09db14463cb1bb5efc6cbe154ca415e1e0a6118180c093f5f54d
Ubuntu Security Notice 2522-2 - USN-2522-1 fixed vulnerabilities in ICU. On Ubuntu 12.04 LTS, the font patches caused a regression when using LibreOffice Calc. The patches have been temporarily backed out until the regression is investigated. It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 12.04 LTS. It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. Various other issues were also addressed.
176846ea7d6434ad158a303218705a12d6028f9921b3142014f7cde21e95132f
Gentoo Linux Security Advisory 201503-1 - Multiple vulnerabilities have been found in JasPer, the worst of which could could allow an attacker to execute arbitrary code. Versions less than 1.900.1-r9 are affected.
f1b2f95e94e028b6690ee805e51d424761431bc8c81d2e2c0e3219ebf38bab89
The Nvidia Mental Ray Satellite Service listens for control commands on port 7414. When it receives the command to load a DLL (via an UNC path) it will try to connect back to the host on port 7514. If a TCP connection is successful it will then attempt to load the DLL. This Metasploit module has been tested successfully on Win7 x64 with Nvidia Mental Ray Satellite Service v3.11.1.
d20a1acb01b0356c8f7a9dfb93f9f6c186f8a9c91ae2ee919bd91f597ae8afef
FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.
9a53f2d3a6a0c39949351f123fcd236f520906a9e7621c0c0816e5e4ba8c4c88
ProjectSend version r561 suffers from a remote SQL injection vulnerability.
68a8e9de29c4371d5bc91003a2b4660d35b70370af1d56c731b6dda8eff4db34
WordPress Download Manager plugin version 2.7.2 suffers from a privilege escalation vulnerability.
532e5c85161b48d4be5a0eb89931a07b27372c263c1bbdbc5744cd1861be2d21
Red Hat Security Advisory 2015-0643-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM, in environments managed by Red Hat Enterprise Linux OpenStack Platform. It was found that the Cirrus blit region checks were insufficient. A privileged guest user could use this flaw to write outside of VRAM-allocated buffer boundaries in the host's QEMU process address space with attacker-provided data. This issue was found by Paolo Bonzini of Red Hat.
bf762400139ffabbb3e771c0de115ba56b9a53129261f094e7f1799367f8192a
Red Hat Security Advisory 2015-0644-01 - OpenStack Image service provides discovery, registration, and delivery services for disk and server images. It provides the ability to copy or snapshot a server image, and immediately store it away. Stored images can be used as a template to get new servers up and running quickly and more consistently than installing a server operating system and individually configuring additional services. A storage quota bypass flaw was found in OpenStack Image. If an image was deleted while it was being uploaded, it would not count towards a user's quota. A malicious user could use this flaw to deliberately fill the backing store, and cause a denial of service.
9894f561a32ffa04150155bea748cc3a0be6cfa07c1b9634248c1045286266a1
Red Hat Security Advisory 2015-0642-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. An information leak flaw was found in the way Thunderbird implemented autocomplete forms. An attacker able to trick a user into specifying a local file in the form could use this flaw to access the contents of that file.
629dab41ad9d1b0606cb34647381b1a8903247dc612df44b8803c834e247a7a2
Red Hat Security Advisory 2015-0645-01 - The Red Hat Support plug-in for Red Hat OpenStack is a Technology Preview feature which offers seamless integrated access to Red Hat subscription services from the Red Hat OpenStack administration portal. The plug-in provides automated functionality that enables quicker help, answers, and proactive services. It offers easy and instant access to Red Hat exclusive knowledge, resources, engagement, and diagnostic features. It was found that the local log-viewing function of the redhat-access-plugin for OpenStack Dashboard did not sanitize user input. An authenticated user could use this flaw to read an arbitrary file with the permissions of the web server.
8ac2383a11c76c592597b36caea5862697e1c2d7027c85ed2e894650af5305bb