Htcap Analysis Tool Alpha 0.1

Htcap is a web application analysis tool for detecting communications between javascript and the server. It crawls the target application and maps ajax calls, dynamically inserted scripts, websockets calls, dynamically loaded resources and some interesting elements. The generated report is meant to be a good starting point for a manual web application security audit. Htcap is written in python and uses phantomjs to load pages injecting a probe that analyzes javascript behaviour. Once injected, the probe, overrides native javascript methods in order to intercept communications and DOM changes. It also simulates user interaction by firing all attached events and by filling html inputs.

CESA-2015:1189 Important CentOS 5 kvm SecurityUpdate

CentOS Errata and Security Advisory 2015:1189 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1189.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 


x86_64:
492ee4251b86edf043521fb03757643de2f25776eb6eab5745b53d1d2337be63  kmod-kvm-83-273.el5.centos.x86_64.rpm
4e43433ec3b141ff6d3eae3d2d4c2407ece9ce948439a4cdc87e651b26dd1e0c  kmod-kvm-debug-83-273.el5.centos.x86_64.rpm
62f07523683d3bc7dd295bb39f079d9a08d4d4f4136d920a0b6baf026ca8d2ae  kvm-83-273.el5.centos.x86_64.rpm
6a61830f8c07eaa0ce456660fd5bbe1f0d8a1ff791db0507b199e3cf70f3951f  kvm-qemu-img-83-273.el5.centos.x86_64.rpm
83104ad3a7483c91c8cb0c09700c08bb5d3463fe20c455e367f17c2c49ce80d1  kvm-tools-83-273.el5.centos.x86_64.rpm

Source:
b83cedf1824e79195e22e88c431c8f87be9189e61d0dc67dc77eaff507a0a44c  kvm-83-273.el5.centos.src.rpm



SEC Consult SA-20150626-0 :: Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) allow surveillance on conferences

Posted by SEC Consult Vulnerability Lab on Jun 26

SEC Consult Vulnerability Lab Security Advisory < 20150626-0 >
=======================================================================
title: Critical vulnerabilities allow surveillance on conferences
product: Polycom RealPresence Resource Manager (RPRM)
vulnerable versions: <8.4
fixed version: 8.4
CVE numbers: CVE-2015-4681, CVE-2015-4682, CVE-2015-4683, CVE-2015-4684…

CVE-2015-1158 (cups)

The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.