PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
97f539eeb90b8cb653fc9dbd151af722eba19f53c751aec16dc2d94f55258007
Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.
6f128ab57db061f7c39e804eb0af1171237079e9b2a5a9354cad29eb4fcc21f2
D-Link Central WiFiManager CWM-100 version 1.03 r0098 devices will load a trojan horse "quserex.dll" and will create a new thread running with SYSTEM integrity.
52c49a3a7607f161b4168d84b61bd33426cca6070383c6347c351b60ea7cade1
Using a web browser or script server-side request forgery (SSRF) can be initiated against internal/external systems to conduct port scans by leveraging D-LINK's MailConnect component. The MailConnect feature on D-Link Central WiFiManager CWM-100 version 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI. This can undermine accountability of where scan or connections actually came from and or bypass the FW etc. This can be automated via script or using Web Browser.
53baa0e6a12bb0ef14fad1c04c6d784940b40d49e5593d74db2b71aa5c26e072
The FTP Server component of the D-LINK Central WifiManager can be used as a man-in-the-middle machine allowing PORT Command bounce scan attacks. This vulnerability allows remote attackers to abuse your network and discreetly conduct network port scanning. Victims will then think these scans are originating from the D-LINK network running the afflicted FTP Server and not you. Version 1.03 r0098 is affected.
b4c780a65fbf4c9da691e430cf3ab77157fb42d84886375e480aa0fb88b21444
A vulnerability in the system scanning component of Cisco Immunet and Cisco Advanced Malware Protection (AMP) for Endpoints running on Microsoft Windows could allow a local attacker to disable the scanning functionality of the product. This could allow executable files to be launched on the system without being analyzed for threats. The vulnerability is due to improper process resource handling. Cisco Immunet versions prior to 6.2.0 and Cisco AMP For Endpoints version 6.2.0 are affected.
5017f9c736285c4def48333e34e95f0cc85a4c481b2df3b3524424ab4b0de654
OpenSLP version 2.0.0 suffers from multiple out-of-bounds vulnerabilities.
892cd678b3963c6dfc8ea0d9df1e2bb7239c8092c7d5099d5a6356846a6063bf
Microsoft Windows 10 Build 17134 local privilege escalation exploit with UAC bypass.
e3dd973532e4f2d060b4d0b153971e8ddc2cc77a366635af649f3f1227c276e5
VMware Security Advisory 2018-0027 - VMware ESXi, Workstation, and Fusion updates address uninitialized stack memory usage.
19a8796446a2f63f4cbd94fbcddfe7c6b1795724ba4b0b207ad2e6bd9731f619
Red Hat Security Advisory 2018-3531-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.3.0. Issues addressed include an integer overflow vulnerability.
8c15fea412bc4b4a2e9f6cbca2957d6a314483c55100b21551aaed960fd825ed
Red Hat Security Advisory 2018-3532-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.3.0. Issues addressed include an integer overflow.
7ddabe0c631f025e5f76c79adbf664f42dddd68dbde947f177178f29cfde288d
Red Hat Security Advisory 2018-3533-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR5-FP25. Issues addressed include a denial of service vulnerability.
cbafd6a88390e5eb75498f509692813f4707486c5cf68f4321300a3c3a979141
Red Hat Security Advisory 2018-3534-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR5-FP25. Issues addressed include a denial of service vulnerability.
83f77043b0fc51469c74877f96ad23dd3aeaa9179fc8bd20ad70e5db6b99d115
Gentoo Linux Security Advisory 201811-4 - Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code. Versions less than 60.3.0 are affected.
8aa3bc82e407773bfdcd9ad96772bd8c0b936737c4e6cd15abbc811752a70ecc
Gentoo Linux Security Advisory 201811-3 - A vulnerability in OpenSSL might allow remote attackers to cause a Denial of Service condition. Versions less than 1.0.2o-r6 are affected.
2567e550284a41d0a884d941d89911bfb3bd909ca61b03a9f3e550906d00e4f5
Gentoo Linux Security Advisory 201811-2 - A buffer overflow in Python might allow remote attackers to cause a Denial of Service condition. Versions less than 2.7.15 are affected.
ab1a2c70d9578a62fe64c48c2b127fd608b5cf524a889fee262ec1d849f3d11b
Gentoo Linux Security Advisory 201811-1 - Multiple vulnerabilities have been found in X.Org X11 library, the worst of which could allow for remote code execution. Versions less than 1.6.6 are affected.
8b2028fb671586ac088c78627304c1813822f7f8340fc74d2f634ec2e682c03f