Red Hat Security Advisory 2014-2010-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.
4e4186b1cdf9f66b1e8aa88214c3a03dd064ef6d4eedf6823a6ccf5328190dd1
WordPress WP Unique Article Header Image plugin version 1.0 suffers from cross site request forgery and cross site scripting vulnerabilities.
175c2eebe0cd3e9866320048012d5b850ffb25b206ad28aeb85614bf7ef18381
WordPress WP Limit Posts Automatically plugin version 0.7 suffers from cross site request forgery and cross site scripting vulnerabilities.
02cf02ba43fd5e6ffe80a1658ac7e307090bb1728ec273aa4a332e82163239c7
WordPress TweetScribe plugin version 1.1 suffers from cross site request forgery and cross site scripting vulnerabilities.
1d76406802c8684f889122501e1b3d99929467e88e8f70f3718ece101882a6f2
WordPress Twitter LiveBlog plugin version 1.1.2 suffers from cross site request forgery and cross site scripting vulnerabilities.
7737feb3d919c8f94cdd597b7a5cc7b8587158803d504d5d054e5a53ab8f13e8
WordPress Simplelife plugin version 1.2 suffers from cross site request forgery and cross site scripting vulnerabilities.
7c4e268a4627a49c11ea8bf6e7bdd5bb9da6c039791a9e86fcf216af0b8d04a5
WordPress twimp-wp plugin suffers from cross site request forgery and cross site scripting vulnerabilities.
3dae5e7a77c85db23f395d2cb2ecc855858fb0acc77aefb86f4977c1cbdf7397
WordPress SimpleFlickr plugin version 3.0.3 suffers from cross site request forgery and cross site scripting vulnerabilities.
e1692774df6bebf2a54b8df21cc319a515fe14eee2bef5d0fd6e17ce23626d8b
WordPress gSlideShow plugin version 0.1 suffers from cross site request forgery and cross site scripting vulnerabilities.
bfa31ea8d5f299f8d532e4bb8780f420503736f321ab8645b57e54aaa95b19d8
WordPress PWG Random plugin version 1.11 suffers from cross site request forgery and cross site scripting vulnerabilities.
f2e87260bdcfdbf483b3b9949da97d34b236916bf4d294deadad6f1ada42784c
WordPress Twitter plugin version 0.7 suffers from cross site request forgery and cross site scripting vulnerabilities.
23a51c6208a1b5b6dead07748f840da494c0670601ec660860c6a98508b8f236
WordPress PictoBrowser plugin version 0.3.1 suffers from cross site request forgery and cross site scripting vulnerabilities.
632119ab65337c9900f4748104e1a56dbd6c5b696b97a93076cd1cbad2f7c14b
WordPress iTwitter plugin version 0.04 suffers from cross site request forgery and cross site scripting vulnerabilities.
ed4d8989e384f75da6935067734dbc2603d2986d023c7606f1827a75beba1043
fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
ad431ad8aae28d22666eb7a12646328f564eae8e6cb70fd1d2d6506e44d82ab0
This Whitepaper discusses various incident response methodologies in the context of Advance Persistent Threats.
6d63e768574dbbaffa0f9ac592edcdf824a46f9435bf8c3749fbb80f7a15b666