cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.
dba85064377b53015602e2b422faafdefe0c2b8576d25a235906baf6066c57e6
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
3109579e41aa64caff3257beac21ca0db2ac2dc0d1e660fa3515fd9b032b92ef
This Metasploit module exploits an expression language remote code execution flaw in the Primefaces JSF framework. Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt.
1576a80eac33112b71d8bbd0634e95d85cce414c2c6d818929631b980862b580
Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
f2dd76ebdcf5c7501f6aeaee09b06508b15996cd887cf7efff67eccf43b6188b
glibc suffers from a getcwd() local privilege escalation vulnerability.
b441728a6b8ed19a7661442e1bc22c727e93a78e559d6c68e57e3d8ca1f50f52
GitStack version 2.3.10 suffers from an unauthenticated remote code execution vulnerability.
a91155d4a07456c807cade69e73f702f36305cb7310a3f143e16efc9df4976ca
Oracle JDeveloper IDE suffers from a directory traversal vulnerability.
1d176bdbee49ba892cf19cf1e3798bd83c3a891b6a5e40b040c9740c38088530
Call For Papers for Positive Hack Days VIII which will take place in Moscow, Russia.
19547b03d1faabb364a268b310bbb1daebc93a7ee596c2dc2da0cd343dd3f791
HPE Security Bulletin HPESBHF03805 5 - On January 3 2018, side-channel security vulnerabilities involving speculative execution were publicly disclosed. These vulnerabilities may impact the listed HPE products, potentially leading to information disclosure and elevation of privilege. Mitigation and resolution of these vulnerabilities may call for both an operating system update, provided by the OS vendor, and a system ROM update from HPE. Revision 5 of this advisory.
4eadee5be89a39d53f2cbae37a746c713295e463929a44b449e70ab8f214c346
Slackware Security Advisory - New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
b01cd887f6d3b6900903b688eb5fefc894e09f2c99a2415411638b25be0e61b3
HPE Security Bulletin HPESBMU03806 1 - A potential security vulnerability has been identified in HPE IceWall Products. The vulnerability could be exploited remotely resulting in unauthorized disclosure of information or unauthorized modification. Revision 1 of this advisory.
39800736e4c67dc7857274fc348d25fe796ff008b59eafbd259c6bf1a6a39657
HP Security Bulletin HPSBGN02925 3 - Potential security vulnerabilities have been identified with HP IceWall SSO, IceWall File Manager and IceWall Federation Agent. The vulnerabilities could be exploited remotely resulting in unauthorized access. Revision 3 of this advisory.
58327b2f8053c28f31e6ebd4c63a93b76f22bc91d91ff5f9e21c03b7fca5392d
Debian Linux Security Advisory 4090-1 - Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform SQL injections and various Cross-Side Scripting (XSS) and Server-Side Request Forgery (SSRF) attacks, as well as bypass some access restrictions.
f07361ccb27ae461cfa009b68836ce5e2b954133423a01321e3a373c3b8cac45
Smiths Medical Medfusion 4000 suffers from a dhcp related denial of service vulnerability.
db60cda960b1b42311d58b90ad68304a4e23a518f350cea748358a37108736b5
macOS version 10.13 suffers from a kernel memory disclosure due to lack of bounds checking in AppleIntelCapriController::getDisplayPipeCapability.
fb130620dcdb600a2ebb81e91fb99499f91f82761f79a1fbcc6eee1ab19cfe5d
Microsoft Edge Chakra JIT suffers from multiple ImplicitCallFlags update bugs with RegExp.
1065d508c4c171929a6a28da29e0732150a4065e2c0f01b1c745e4d3632f85ac
Red Hat Security Advisory 2018-0095-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: Multiple flaws were found in the Hotspot and AWT components of OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. It was discovered that the LDAPCertStore class in the JNDI component of OpenJDK failed to securely handle LDAP referrals. An attacker could possibly use this flaw to make it fetch attacker controlled certificate data.
9a9ead0be0c0b8603f1341e6ae2cc4afc54e6876629a31bc348d58a8e1be5ea7
Ubuntu Security Notice 3536-1 - It was discovered that the GNU C library did not properly handle all of the possible return values from the kernel getcwd syscall. A local attacker could potentially exploit this to execute arbitrary code in setuid programs and gain administrative privileges.
b8e54aa839f1953cae81c827296bd6d411bf14b4a0889c2311ae75dee2b376e7
Ubuntu Security Notice 3535-2 - USN-3535-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM. Jayachandran Palanisamy discovered that the Bind resolver incorrectly handled fetch cleanup sequencing. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. Various other issues were also addressed.
fc2e2628b67be6d63e94406b27aba206b799baf71520b2c5c09b6a0aad5fffa0
Microsoft Edge Chakra suffers from an AsmJSByteCodeGenerator::EmitCall call handling bug.
7852e6e6b74797631b260388f45157c223bcb66924df196f3379c451cad2773b
Microsoft Edge Chakra JIT suffers from a loop analysis bug that can perform an out-of-bounds write.
3e5ec999eb8d74a1dbd4ccc9bb26b52067a006e4c7f4e4f43a4a999f1cef8d51
Microsoft Edge Chakra JIT suffers from a stack-to-heap copy bug.
a1676ee18b08a013b47916fe92086dcbe4bcd51909427cb9e5b3b106e5024a96
Microsoft Egde Chakra deferred parsing makes wrong scopes.
4cb0d080415b639ddd74d96d80870142fd089f172bcbeab6ff378835a5252ed9
If a user has sudo permissions to /usr/bin/docker, it can be leveraged to escalated privileges to root.
a181d17e97674635831b162ae57ef255badec70a2f142f2bfd18ed1903842ef8