vulnerabilities

warning: Creating default object from empty value in /home/www/drupal/drupal-6.19/modules/taxonomy/taxonomy.pages.inc on line 34.
28

Has the NSA "poisoned the well" for responsible disclosure?

https://www.openrightsgroup.org

Revelations about the PRISM project involve US tech companies that have been compelled to provide special assistance to US intelligence agencies. Will secret arrangements between tech companies and US intelligence affect how independent security researchers disclose vulnerabilities?

Read more »
Superbowl H5N1's picture
Created by Superbowl H5N1 1 year 9 weeks ago – Made popular 1 year 9 weeks ago
Category: Philosophy   Tags:
138

WPA2 is vulnerable (hole196)

https://en.wikipedia.org

Do you think your wireless communications are secure? Think again. There is a vulnerability built into the WPA2 protocol itself! It's based on abusing the GTK (Group Temporal Key) and can be used to create man-in-the-middle and denial-of-service attacks. Too few people know this.

Read more »
spanky's picture
Created by spanky 1 year 9 weeks ago – Made popular 1 year 9 weeks ago
Category: High End   Tags:
12

Kaspersky study finds Adobe software is biggest security risk

http://www.h-online.com

Before casually clicking on that "Install Adobe Flash Player/Reader" button, think twice. Then don't do it! You'll be inviting every cracker and his dog to invade your network.

Read more »
lozz's picture
Created by lozz 3 years 4 days ago – Made popular 3 years 3 days ago
Category: Beginner   Tags:
25

Remote Exim Exploit In the Wild

http://it.slashdot.org

The news comes on the exim mailing list, where a user posted that he had his exim install hacked via remote exploit giving the attacker the privilege of the mailnull user, which can lead to other possible attacks. A note up at the Internet Storm Center reminds exim users how to set up to run in unprivileged mode, and a commenter includes recompile instructions for Debian exim for added safety.

Read more »
spanky's picture
Created by spanky 3 years 36 weeks ago – Made popular 3 years 36 weeks ago
Category: High End   Tags:
19

Damn Vulnerable Linux

http://www.linuxaria.com

Damn Vulnerable Linux – The most vulnerable and exploitable operating system ever! Damn Vulnerable Linux is the most complete training environment for IT security with over 500.000 downloads. It includes all tools you need ready to go. Additionally tons of training material and exercises are included.

Read more »
sunny's picture
Created by sunny 3 years 47 weeks ago – Made popular 3 years 47 weeks ago
Category: High End   Tags:
16

LinuxCon: Exploits Show Why Linux Is Vulnerable

http://www.esecurityplanet.com

There is a widely held belief that Linux is a completely secure operating system. But to Brad Spengler of the grsecurity project, the belief is far from accurate. And he has the kernel exploits to prove it.

Read more »
keyboardninja's picture
Created by keyboardninja 4 years 3 days ago – Made popular 4 years 3 days ago
Category: High End   Tags:
30

RSA Authentication Weakness Discovered

http://www.net-security.org

The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer scientists have discovered.

Read more »
prakash's picture
Created by prakash 4 years 23 weeks ago – Made popular 4 years 23 weeks ago
Category: High End   Tags:
22

sudo vulnerabilities

http://www.ubuntugeek.com

A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 Ubuntu 9.10

Read more »
mick's picture
Created by mick 4 years 24 weeks ago – Made popular 4 years 24 weeks ago
Category: High End   Tags:
22

10 Kernel Vulnerabilities in Ubuntu 6.06, 8.04, 8.10, 9.04 and 9.10

http://news.softpedia.com

Canonical announced a few hours ago the immediate availability of a new Linux kernel security update for the following Ubuntu distributions: 6.06 LTS (Dapper Drake), 8.04 LTS (Hardy Heron), 8.10 (Intrepid Ibex), 9.04 (Jaunty Jackalope) and 9.10 (Karmic Koala).

Read more »
binarycanary's picture
Created by binarycanary 4 years 27 weeks ago – Made popular 4 years 27 weeks ago
Category: End User   Tags:
20

FreeBSD bug gives untrusted root access

http://www.theregister.co.uk

A security bug in the latest version of the FreeBSD can be exploited to grant unprivileged users complete control over the operating system, a German researcher said Monday.

Read more »
johncuk's picture
Created by johncuk 4 years 37 weeks ago – Made popular 4 years 37 weeks ago
Category: High End   Tags:
20

Vulnerability in the GIMP image editing tool

http://www.h-online.com

According to security services provide Secunia, a vulnerability in the free image editing tool GIMP (GNU Image Manipulation Program) can potentially be exploited to compromise a users system.

Read more »
keyboardninja's picture
Created by keyboardninja 4 years 39 weeks ago – Made popular 4 years 39 weeks ago
Category: High End   Tags:
20

FreeBSD Local Root Escalation Vulnerability

http://www.darknet.org.uk

It’s been a long time since we’ve heard about a problem with FreeBSD, partially because the mass of people using it isn’t that large and secondly because BSD tends to be pretty secure as operating systems go.

Read more »
arslinuxum's picture
Created by arslinuxum 4 years 48 weeks ago – Made popular 4 years 48 weeks ago
Category: High End   Tags:
20

Mozilla patches 'critical' Firefox flaws

http://blog.mozilla.com

As part of Mozilla’s ongoing stability and security update process, Firefox 3.5.2 and Firefox 3.0.13 are now available for Windows, Mac, and Linux as free downloads

Read more »
kalinos's picture
Created by kalinos 5 years 2 weeks ago – Made popular 5 years 1 week ago
Category: End User   Tags:
18

Top FOSS security vulnerabilities

http://www.linux.com

Palamida, the San Francisco company that helps companies to audit their use of open source software, has released a list of what it calls "the top five most overlooked open source vulnerabilities." To this list, Palamida has added an additional five vulnerabilities exclusively for Linux.com.

Read more »
giantrobot's picture
Created by giantrobot 6 years 35 weeks ago – Made popular 6 years 35 weeks ago
Category: High End   Tags:
12

Researcher publishes attack code for Mozilla flaw

http://www.linuxworld.com

Mozilla is working on patching its Firefox browser after a hacker posted details of a flaw that could let criminals run unauthorized software on a victim's machine.

Read more »
peacemaker's picture
Created by peacemaker 7 years 3 weeks ago – Made popular 7 years 3 weeks ago
Category: End User   Tags: