CEBA-2015:1779 CentOS 7 selinux-policy BugFixUpdate

CentOS Errata and Bugfix Advisory 2015:1779 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1779.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
fd48636bc24a9303826e1c57008d7da21a8dc5a72cae72ccaa88e3cdf8406e61  selinux-policy-3.13.1-23.el7_1.18.noarch.rpm
7ed18f9a42ea5cbadf0ed1304273577c8a92220dc24bbb11277ce5b8ecc0cb45  selinux-policy-devel-3.13.1-23.el7_1.18.noarch.rpm
614c5f412cd5be0f2f3cc509ceeddfeb34ffbb30b847edcf0eccb6ecf4ec77f5  selinux-policy-doc-3.13.1-23.el7_1.18.noarch.rpm
ac28e2d9c0b002342e63f2ff042f1fc19ec1ec18d8d2bfc7e0ada23af65fca14  selinux-policy-minimum-3.13.1-23.el7_1.18.noarch.rpm
35267737fc44312feeae5a956b2538e94a31247bdea76d5e4fa4d918f84997fe  selinux-policy-mls-3.13.1-23.el7_1.18.noarch.rpm
77e51ef161d5894dca0bdb5153025a6cc29b771b44b3c093f51ec477bf2804d1  selinux-policy-sandbox-3.13.1-23.el7_1.18.noarch.rpm
9cf3ad902a64688cbd340912bd73312160941b4f12ff8818b9097910f687c0a4  selinux-policy-targeted-3.13.1-23.el7_1.18.noarch.rpm

Source:
17b01fe0f78ed5268329d5ee378bf9c23a4afcc34d3ae525cff9ec309e0d12b0  selinux-policy-3.13.1-23.el7_1.18.src.rpm



CEBA-2015:1790 CentOS 7 fence-agents BugFix Update

CentOS Errata and Bugfix Advisory 2015:1790 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1790.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
ec798d14e642fef7a4957fb02f0ade7c54f00a518de456922ee3e1a83fcf275f  fence-agents-all-4.0.11-13.el7_1.2.x86_64.rpm
d9d459ebc7f9c072f3efe28744084e946bdd895d1c057387f2dbab0dd79f3367  fence-agents-apc-4.0.11-13.el7_1.2.x86_64.rpm
6908bc5d7319ca72508f4631b0b5b9b9e995a2ea88afaf05c8bceed890f373ed  fence-agents-apc-snmp-4.0.11-13.el7_1.2.x86_64.rpm
be3d33249da9a96e7ad042e89e350165c6713b4b1d0e8d5abc349b6498a5501f  fence-agents-bladecenter-4.0.11-13.el7_1.2.x86_64.rpm
428989382a85f030af190546a6a5b11b4329e40334be9bdec9eb354170aaffd2  fence-agents-brocade-4.0.11-13.el7_1.2.x86_64.rpm
f41ddbdf44089030e5e144df7144147b517aa6b08eff6e151bea914ba8652dd0  fence-agents-cisco-mds-4.0.11-13.el7_1.2.x86_64.rpm
0fef8ff1aa21a86b2153b5f8c5e240f84f0c9b27eb33e6eabac9029d0930cec3  fence-agents-cisco-ucs-4.0.11-13.el7_1.2.x86_64.rpm
2259b9cefacbe564b048136004f6f15607a95c5725db3098198a7cc3121748e5  fence-agents-common-4.0.11-13.el7_1.2.x86_64.rpm
74ea75cd4938f164907985be3311b82248722a572b2c3f3aab3c0c12b4cfde35  fence-agents-compute-4.0.11-13.el7_1.2.x86_64.rpm
fed37bf389f30e000ee367401690aa6fac5ce1588c192a0d1b11da2d1b7713a8  fence-agents-drac5-4.0.11-13.el7_1.2.x86_64.rpm
af781b8c2f71d05a33fb55f7391baa810d1c30e4b912b33f0a233e579d93d680  fence-agents-eaton-snmp-4.0.11-13.el7_1.2.x86_64.rpm
8e47e4f9a4320bc693d6407407b238a9fcaca0292e5b2be4d4b22bcc01f37175  fence-agents-eps-4.0.11-13.el7_1.2.x86_64.rpm
19933ce5961c0c8201416a29ca7778fbef598c3bccdad08efbde2ae320cdd489  fence-agents-hpblade-4.0.11-13.el7_1.2.x86_64.rpm
464f26b12f05209adc4d575064d0e4f0cfcaec4202149e1404f15b3d3d689a63  fence-agents-ibmblade-4.0.11-13.el7_1.2.x86_64.rpm
c1911b20a94535a236c912f628874217a9415e9e2047fe1260dcc0abc4a7e81b  fence-agents-ifmib-4.0.11-13.el7_1.2.x86_64.rpm
1f9b5da41bcd3a6137d284e2177a6e238499bd0dd1f0d3a01a70caa825a64ac4  fence-agents-ilo2-4.0.11-13.el7_1.2.x86_64.rpm
dc099144e67acd1f0412a3680d1286453ff4351bf6dceb2b1a648b3220a3d116  fence-agents-ilo-mp-4.0.11-13.el7_1.2.x86_64.rpm
c37b1a4856eec1b7bef968f7fe847f70bcc1dccb0e923cd843da3f57e727a350  fence-agents-ilo-ssh-4.0.11-13.el7_1.2.x86_64.rpm
c94a5edb7006e123be6e19a943370036fa367d6ee85c0c6c38cec5cf2b9d5c8a  fence-agents-intelmodular-4.0.11-13.el7_1.2.x86_64.rpm
1449f424364d4e490c8d7b4ac98679efe62c6e0894e4d6f52b8a3fb4635525fa  fence-agents-ipdu-4.0.11-13.el7_1.2.x86_64.rpm
6d4084d5afe109a2f3a1fd24fa787aefb9ad76168af023f746d100bd1a3bff93  fence-agents-ipmilan-4.0.11-13.el7_1.2.x86_64.rpm
587c028006363f2ef2cd4db11957fd490fd7cb667df8deb2b52663e9b39d03d4  fence-agents-kdump-4.0.11-13.el7_1.2.x86_64.rpm
1d07baec81a06ffce499d9f3de8de1b8e93865ad7fd117a71d75002ca3f27ade  fence-agents-rhevm-4.0.11-13.el7_1.2.x86_64.rpm
2e79bdf86010169cf581a1b7ffa157822c76264fcca7972a7b0207516a2b0bd6  fence-agents-rsb-4.0.11-13.el7_1.2.x86_64.rpm
193c5770c07accf4adb620907c376325eed35d3cca8bfc78aac1cf7df1dda6b5  fence-agents-scsi-4.0.11-13.el7_1.2.x86_64.rpm
054ff3065af4acc7d8856065cdd7ee5ec2a23477939397058ade7b4ff02f1aa5  fence-agents-virsh-4.0.11-13.el7_1.2.x86_64.rpm
0812ef928f207a34c1133781f4e14af0c1456c64307520d44046e773980ecc97  fence-agents-vmware-soap-4.0.11-13.el7_1.2.x86_64.rpm
64e5984ecbd97ce286d1c8f9f470bec0be808d325cb295cd36970873d4497b59  fence-agents-wti-4.0.11-13.el7_1.2.x86_64.rpm

Source:
1d69ade001b5a651b7a430f7d02f3404061d5f2f0f7764158dd9e658b25f05ac  fence-agents-4.0.11-13.el7_1.2.src.rpm



Panda Security achieves a 100% detection rate yet again, according to AV-Comparatives!

It’s happened again! Our free antivirus, Panda Free Antivirus, has obtained a 100% rate of detection according to the monthly report that was carried out in August by AV-Comparatives.

This is another success for our XMT motor, which is the basis for all of our consumer solutions.

av comparatives august

That’s not all, though! We scored the same result in the Real World Protection Test that was carried out during the last three months. This test recreates real-life conditions in which it analyzes and subjects different protection solutions to various tests. Here are Panda’s results:

comparatives
You can see all of the information in this infographic, which explains it all for you. Congratulations, everyone!

The post Panda Security achieves a 100% detection rate yet again, according to AV-Comparatives! appeared first on MediaCenter Panda Security.

Kids safety online depends on us being better role models

We lock our doors and activate security systems to keep intruders out. We place parental controls on TV channels to manage what our children watch. We keep our kids out of R-rated movies until we feel it’s appropriate. We monitor the violence of their videos games. All of this to keep them shielded from explicit content. Except this time, the violence was very real and readily available on social media.

The recent shootings in Virginia created an unprecedented situation for parents. The incident was caught on camera during a live broadcast of a television newscast, producing a graphic video of the shooting, violence that wasn’t in a video game or TV show but a real murder. That clip, along with video of shocked expressions during the newscast, circulated the Internet available for children to stumble upon. The shooter also recorded the murder from his phone and uploaded it onto social media, making the video widely available. And people viewed it and shared it.

This also raises larger questions: How many people viewed these videos online? Should we have sought out and viewed these videos? Is there a social responsibility to take ownership of our online behaviour? Is our own behaviour demonstrating to our kids how to responsibly use the internet?

The children we try so hard to protect could have seen these videos online. Children’s introduction to the Internet often happens before they’re educated in online safety skills. An AVG Technologies survey found 66 percent of children ages three to five stated that they can play a computer game, but only 14 percent can tie their own shoes.

Much of the online crises that can occur to youth today—from teen sexting to identity theft to cyberbullying—can be mostly avoided if they understand the consequences of their actions. According to the same survey from AVG, nearly one in three teenagers said they regret posting something online and 32 percent have had to ask someone to remove content posted online about them.

When technological development outpaces society’s sense of responsibility and understanding of that technology, it can create unintended consequences in our lives and in the lives of our children. The answer is not only to encourage a society-wide attitude of responsibility for our impact as digital citizens, but also to empower the leadership of organizations to work together and create new solutions that allow innovation to continue while taking responsibility for our own digital lives.

For more information about the Smart User Initiative, go to www.smartuser.com.

ManageEngine EventLog Analyzer SQL query execution

Posted by xistence on Sep 15

Exploit Title: ManageEngine EventLog Analyzer SQL query execution
Product: ManageEngine EventLog Analyzer
Vulnerable Versions: v10.6 build 10060 and previous versions
Tested Version: v10.6 build 10060 (Windows)
Advisory Publication: 14/09/2015
Vulnerability Type: authenticated SQL query execution
Credit: xistence <xistence[at]0x90.nl>

Product Description
——————-

EventLog Analyzer carry out logs analysis for all Windows, Linux…

ManageEngine OpManager multiple vulnerabilities

Posted by xistence on Sep 15

Exploit Title: ManageEngine OpManager multiple vulnerabilities
Product: ManageEngine OpManager
Vulnerable Versions: v11.5 and previous versions
Tested Version: v11.5 (Windows)
Advisory Publication: 14/09/2015
Vulnerability Type: hardcoded credentials, SQL query protection bypass
Credit: xistence <xistence[at]0x90.nl>

Product Description
——————-

ManageEngine OpManager is a network, server, and virtualization monitoring
software…

[CVE-2015-5956] Typo3 Core sanitizeLocalUrl() Non-Persistent Cross-Site Scripting

Posted by Ahrens, Julien on Sep 15

secunet Security Networks AG Security Advisory

Advisory: Typo3 Core sanitizeLocalUrl() Non-Persistent Cross-Site Scripting

1. DETAILS
———-
Product: Typo3 CMS
Vendor URL: typo3.org
Type: Cross-site Scripting[CWE-79]
Date found: 2015-07-30
Date published: 2015-09-14
CVSSv2 Score: 3,5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)
CVE: CVE-2015-5956

2. AFFECTED VERSIONS
——————–
Typo3 6.2.14 and…

Weeman 1.1 HTTP server for phishing | release announcement

Posted by Hypsurus on Sep 15

Hello list,

Weeman 1.1 – is a simple HTTP server (Using python).

The server will do the following steps:

1, will create a phishing page,
2, will grab the DATA take the user,
3, and will try to login the user to the original website.

Tested only on linux.

You will need to install python <= 2.x , and python2-beautifulsoup4

Screenshot and repository: https://github.com/Hypsurus/weeman.git

The project is open-source (GPLV3 license), feel…