Gentoo Linux Security Advisory 201908-5 - Multiple vulnerabilities have been found in LibVNCServer, the worst of which could result in the arbitrary execution of code. Versions less than 0.9.12 are affected.
6d1f5188e6497480c4deb3a3df963be2010e2c3b629e2e4e80e06d95103650a7
Gentoo Linux Security Advisory 201908-4 - Multiple vulnerabilities have been found in Redis, the worst of which may allow execution of arbitrary code. Versions less than 4.0.14 are affected.
8735d88ad71ceef1f22d1712a9b1e072fddd93a6272c38c7843ff192a5018b17
Gentoo Linux Security Advisory 201908-3 - Multiple vulnerabilities have been found in JasPer, the worst of which could result in a Denial of Service condition. Versions less than or equal to 2.0.16 are affected.
5ff0ecf4467bc57befb27198e418acd12051fa60f8e3f4437c418cdbc9172311
Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.
469dd7456af388ba65d8722fbfdd5b9182f14def16149aa5ebceb1cfd881697f
This is a guide to red teaming operations. It covers the basic questions like what is a red team, differences between red teaming and vulnerability assessments along with advance theory such as how red team engagements are done. Thought processes and legal processes are also covered.
5cc2490b24414f5aeb2a2e09e0c87501a01a2b68b64b7528e03498377c40dfb4
A remote vulnerability was discovered on D-Link DIR-600M Wireless N 150 Home Router in multiple respective firmware versions. The vulnerability provides unauthenticated remote access to the router's WAN configuration page i.e. "wan.htm", which leads to disclosure of sensitive user information including but not limited to PPPoE, DNS configuration etc, also allowing to change the configuration settings as well. Metasploit module and NSE scripts are included.
c3ec1fb4a9de9937293c1284d8384f4b72b88bd5045fc4fb2c0d6f6d88fc77f7
Ubuntu Security Notice 4090-1 - Tom Lane discovered that PostgreSQL did not properly restrict functions declared as "SECURITY DEFINER". An attacker could use this to execute arbitrary SQL with the permissions of the function owner. Andreas Seltenreich discovered that PostgreSQL did not properly handle user-defined hash equality operators. An attacker could use this to expose sensitive information. This issue only affected Ubuntu 19.04. Various other issues were also addressed.
08a7d1dd194656be881ca1b5fa33251323ab57afe6d39e8321f31a6a5a13744c
Red Hat Security Advisory 2019-2425-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include buffer overflow and information leakage vulnerabilities.
d8a0c17f6966983bd5d0c20390af20e3c934d76a58063bbc17816213c2604520
Debian Linux Security Advisory 4493-1 - Two security issues have been discovered in the PostgreSQL database system, which could result in privilege escalation, denial of service or memory disclosure.
f7c353c8f3ec9a7194362eb2151805d0abf780117b39cdc344effe835fdc09ca
Debian Linux Security Advisory 4492-1 - A issue has been discovered in the PostgreSQL database system, which could result in privilege escalation.
851cfceb779eb5e6c5541637501e187b2010510468b87cd72c869ea7c93cce6d