CentOS Errata and Security Advisory 2015:1982 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1982.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 8cd918dbf73478454473fcacee6c4769f680c9ac025dd3290facf1f8a21be7a7 firefox-38.4.0-1.el7.centos.i686.rpm 6cd3447bc39d108b2bd968d2a59b475ebf1731236c3d241b5b58a390e0406771 firefox-38.4.0-1.el7.centos.x86_64.rpm Source: 0f5b28e3a252893d0cf68f27bf85b0d1a0f075764bc009aa967967ced9b0c877 firefox-38.4.0-1.el7.centos.src.rpm
Monthly Archives: November 2015
CESA-2015:1981 Critical CentOS 7 nspr SecurityUpdate
CentOS Errata and Security Advisory 2015:1981 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1981.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: ddc6b8eb467af6527ab38d900b3a42d2818e89c7fb1e12e963d1650fc52931a8 nspr-4.10.8-2.el7_1.i686.rpm f339ae62c6516608a43d96d8b771827c5521f720b88499a23b36eb717fbc7ff7 nspr-4.10.8-2.el7_1.x86_64.rpm 58abf80430da2d52b941301a4d7caf57f902301413851f1ca570c7b5a8b92867 nspr-devel-4.10.8-2.el7_1.i686.rpm 4600dc9e273657741a1a3d636669d61caf338039f82ad4842a35303e10a02f30 nspr-devel-4.10.8-2.el7_1.x86_64.rpm Source: ace8e8e2b8bddea8d124e2038b114e45ac748566ecb32d7f6bc02616b31cc41e nspr-4.10.8-2.el7_1.src.rpm
CESA-2015:1981 Critical CentOS 7 nss-utilSecurity Update
CentOS Errata and Security Advisory 2015:1981 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1981.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: b0fcaaf2573261e960592ca2d2283e944200e9c1c3995340a3794760d53318f5 nss-util-3.19.1-4.el7_1.i686.rpm d676ff9af90d923b0e56d73a6fe6948433815f7855a8b4848ff9ff5a80533ff6 nss-util-3.19.1-4.el7_1.x86_64.rpm ca57d3affff7bc8d922d104c9a77a029019442da52fd4458742c121e210275d8 nss-util-devel-3.19.1-4.el7_1.i686.rpm 03e8cc968c620a057c6ae5836fb4528dc6e57a5136346ab081f5dcff2b630a20 nss-util-devel-3.19.1-4.el7_1.x86_64.rpm Source: 819872b90548767e000ab23ece4bc3dc93d5ed3b29da8a878c1741c285ae8a75 nss-util-3.19.1-4.el7_1.src.rpm
CESA-2015:1981 Critical CentOS 7 nss SecurityUpdate
CentOS Errata and Security Advisory 2015:1981 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1981.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: c4090c4b3292ac5abf553f3ce549681f0149d3b710bc003c2c8a2cc6b6610b16 nss-3.19.1-7.el7_1.2.i686.rpm 4b0d5af373f0a952ac8bb790ac66cb6b2a4885cd50997227a2e805ba9e283713 nss-3.19.1-7.el7_1.2.x86_64.rpm 06afd54f33802ba9ba652da815fa746f1e5ba6920c41de22d1d92705861bc399 nss-devel-3.19.1-7.el7_1.2.i686.rpm bb401acfc337762b68a8dda8aeb8300cd98d19008f4c8dd8f12e50417955a23d nss-devel-3.19.1-7.el7_1.2.x86_64.rpm 3b77ee153fb5b4146e4a6d56831632c22e9ef63655b2f95550bb9340dd808835 nss-pkcs11-devel-3.19.1-7.el7_1.2.i686.rpm 635635456afa983131154ee7016a574587b525d854d0b4d3f836201584fef0b6 nss-pkcs11-devel-3.19.1-7.el7_1.2.x86_64.rpm cc3f62c788d779233d3802d6de3c6179f1caf7a41dd4b018793efaff2e80d99c nss-sysinit-3.19.1-7.el7_1.2.x86_64.rpm 204e9a754faef24dc02ab2fac73c3eb9d389afb7172251b7bbcff178dbe22afa nss-tools-3.19.1-7.el7_1.2.x86_64.rpm Source: 0a6f1ece7dd05a5b2b33e9d131a0819c5f86ee3f2d528e225920f637f8787376 nss-3.19.1-7.el7_1.2.src.rpm
How to stop your child from downloading inappropriate apps

There can’t be a parent in the world who doesn’t know the beauty of a happy, entertained child. Unfortunately, parents can’t always play the role of the entertainer because keeping a child attentive and interested is not an easy task. So, what can a parent do to keep their little one distracted while they grab a few minutes for themselves? In the past the television was a guaranteed way to keep kids occupied – sit them down on the sofa, switch on some cartoons, and finally get some household chores out of the way while the kids watched their favorite animated characters in delight.
Nowadays, however, with the explosion in tablets and smartphones, there are a whole array of apps for kids to play with. Unfortunately, leaving your electronic device in the hands of a curious and adventurous child could wind up being more trouble than it seems. Due to their nature, children will be intrigued by the device and may end up diverging away from the game or app that you have selected for them, possibly even entering the Apple Store or Google Play store, and downloading some inappropriate content.
What’s even more worrying is that it is also possible to carry out in-app purchases, even in apps aimed at kids. So if you’ve left your purse or wallet lying around, and your child is clever enough to put two and two together, you could wind up with some unexpected charges.
If you aren’t sure on how best to stop your child from downloading inappropriate apps or making in-app purchases, then fear not as we’ve compiled a few tips to ensure that your child won’t have access to content that isn’t suitable for them.

If you’re an iOS user…
- Turn on your restrictions
This may seem obvious, but a lot of people don’t know that the settings of your iOS device allow you to restrict certain activity. All you need to do is enter your settings and hit the tab in the part labelled “General” to turn them. Once activated, you select a special password which will make it impossible to turn the restrictions back off unless the password is entered.
From there you can go through your list of apps and choose which ones you want to put restrictions on by selecting the tab beside the apps. A further step would be to remove your chosen payment method from your Apple account.
- Demand a password for purchases
If you don’t want to ban purchases completely, you can also put a limitation that requires a password every time there is a purchase made in the App Store or iTunes Store.
- Monitor accounts for teenagers
If you have a child that is over 13 years of age that has their own Apple account, make sure that you only allow them to make purchases with gift cards. If you still don’t trust this method, you can activate the “Ask to Buy” feature if you are using Family Sharing.
If you’re an Android user…
- Be aware of authentication processes
Google Play has an authentication process that has a few different options available. First of all, any app that is aimed at children aged 12 or under automatically requires authorization for in-app purchases. However, for other apps you can freely download unless you set up authorization for every purchase or for purchases made every 30 minutes. We highly recommend choosing the former, which you can access via the User Control area.
- Have the same restrictions on all devices
Authentication settings apply only to the device where you add them. If you use your Google Account on more than one device, you must repeat the instructions mentioned above on each device.
So, as you can see all it takes is 10 minutes of having a look at your settings and you can avoid any nasty surprises or unexpected charges. If you’re wondering how else to protect your kids when they’re using the Internet, here are some further tips that will allow them to surf the net safely.
The post How to stop your child from downloading inappropriate apps appeared first on MediaCenter Panda Security.
[KIS-2015-08] ATutor <= 2.2 (edit_marks.php) PHP Code Injection Vulnerability
Posted by Egidio Romano on Nov 04
—————————————————————
ATutor <= 2.2 (edit_marks.php) PHP Code Injection Vulnerability
—————————————————————
[-] Software Link:
[-] Affected Versions:
Version 2.2 and prior versions.
[-] Vulnerability Description:
The vulnerable code is located in the /mods/_standard/gradebook/edit_marks.php script:
54. if…
[KIS-2015-09] Piwik <= 2.14.3 (viewDataTable) Autoloaded File Inclusion Vulnerability
Posted by Egidio Romano on Nov 04
———————————————————————–
Piwik <= 2.14.3 (viewDataTable) Autoloaded File Inclusion Vulnerability
———————————————————————–
[-] Software Link:
[-] Affected Versions:
Version 2.14.3 and prior versions.
[-] Vulnerability Description:
The vulnerable code is located in the /core/ViewDataTable/Factory.php script:
130….
[KIS-2015-10] Piwik <= 2.14.3 (DisplayTopKeywords) PHP Object Injection Vulnerability
Posted by Egidio Romano on Nov 04
———————————————————————–
Piwik <= 2.14.3 (DisplayTopKeywords) PHP Object Injection Vulnerability
———————————————————————–
[-] Software Link:
[-] Affected Versions:
Version 2.14.3 and prior versions.
[-] Vulnerability Description:
The vulnerability is caused by the DisplayTopKeywords() function
defined in the…
[KIS-2015-05] ATutor <= 2.2 (Custom Course Icon) Unrestricted File Upload Vulnerability
Posted by Egidio Romano on Nov 04
————————————————————————-
ATutor <= 2.2 (Custom Course Icon) Unrestricted File Upload Vulnerability
————————————————————————-
[-] Software Link:
[-] Affected Versions:
Version 2.2 and prior versions.
[-] Vulnerability Description:
User input passed through the “customicon” when creating a new course is…
[KIS-2015-06] ATutor <= 2.2 (confirm.php) Session Variable Overloading Vulnerability
Posted by Egidio Romano on Nov 04
———————————————————————-
ATutor <= 2.2 (confirm.php) Session Variable Overloading Vulnerability
———————————————————————-
[-] Software Link:
[-] Affected Versions:
Version 2.2 and prior versions.
[-] Vulnerability Description:
The vulnerable code is located in the /confirm.php script:
140. if…