1

Tenshi Log Monitoring Program 0.17

tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.









1

Secunia Security Advisory 51973

Secunia Security Advisory - SUSE has issued an updated for libtiff. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.




1

Secunia Security Advisory 51947

Secunia Security Advisory - SUSE has issued an update for WebYaST and SUSE Studio Standard Edition. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.




1

Secunia Security Advisory 52124

Secunia Security Advisory - SUSE has issued an update for libupnp. This fixes three vulnerabilities, which can be exploited by malicious people to compromise an application using the library.




1

Secunia Security Advisory 52111

Secunia Security Advisory - SUSE has issued an update for apache2. This fixes two weaknesses, a security issue, and a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.




1

Secunia Security Advisory 52113

Secunia Security Advisory - SUSE has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.




1

Secunia Security Advisory 52160

Secunia Security Advisory - SUSE has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.




1

Secunia Security Advisory 52159

Secunia Security Advisory - SUSE has issued an update for MySQL. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct brute force attacks.




1

Secunia Security Advisory 52148

Secunia Security Advisory - SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to potentially cause a DoS (Denial of Service) in an application using the library.




1

Secunia Security Advisory 52150

Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system.




1

Secunia Security Advisory 52151

Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system.




1

Secunia Security Advisory 52152

Secunia Security Advisory - SUSE has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.




1

Secunia Security Advisory 52135

Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to conduct clickjacking attacks.




1

Secunia Security Advisory 52153

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.




1

Secunia Security Advisory 52149

Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system.




1

Mandriva Linux Security Advisory 2015-046

Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed.




1

Mandriva Linux Security Advisory 2015-140

Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues.






1

HP Security Bulletin 2005-10.23

HP Security Bulletin - A potential vulnerability has been identified with Openview Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to gain privileged access. Affected versions: Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux.




1

prott_packV01A.zip

Protty is a ring 3 library developed to protect against shellcode execution on Windows NT based systems.




1

Debian Linux Security Advisory 830-1

Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users.




1

Cisco Security Advisory 20081022-asa

Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. These include Windows NT domain authentication bypass, IPv6 denial of service, and a Crypto Accelerator memory leak.




1

RegLookup Register Parser 0.12.0

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.




1

RegLookup Registry Parser 1.0.0

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.




1

Disk Pulse Enterprise 9.9.16 GET Buffer Overflow

This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account.




1

SyncBreeze 10.1.16 SEH GET Overflow

There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs.




1

Expect $1.6 Trillion in Clean Energy Investments Through 2020, Says IEA

Investments in new clean-energy capacity will total $1.61 trillion through 2020 even as the expansion of renewables is expected to slow, the International Energy Agency said.




1

Ten Clean Energy Stocks for 2014: September Update and Thoughts on the Finavera Deal

Clean energy stocks and the market in general rebounded strongly in August. My broad market benchmark of small cap stocks, IWM, rose 4.5 percent, returning to positive territory up 1.7 percent for the year. My clean energy benchmark PBW also jumped back into the black with an 11.1 percent gain for the month and 10.8 percent for the year to date.




1

Japan Installs 11 GW of Renewable Energy in Two Years

Japan has added 11,090 megawatts of clean energy capacity since July 2012, when it began an incentive program to encourage investment in renewables, according to the Ministry of Economy, Trade and Industry.





1

UK Green Bank Set to Draw Offshore Wind Investors to $1.6 Billion Fund

The U.K. Green Investment Bank is set to tie up the first investments in a $1.6 billion fund by the end of March, part of Britain’s push to cement its dominance in offshore wind power.




1

The 51st State: What’s Your Ideal Energy Market?

Imagine a place where there is no electricity market. No rules, no policies, no market. A clean slate. This is what the Solar Energy Power Association (SEPA) calls the 51st State, a new initiative to get people to think outside the box when it comes to utility design and infrastructure.




1

Ten Clean Energy Stocks For 2014: Spooky October

October was a spooky month for clean energy stocks. My benchmark Powershares Wilderhill Clean Energy Index (PBW) cringed down 2.9 percent like the young Supergirl who jumped when a mechanical ghost startled her at my door Haloween night.




1

RenewableEnergyWorld.com's Top 10 Blogs of 2014

We here at RenewableEnergyWorld.com would like to send a big "thank you" to our blogging community. Year after year, bloggers contribute content that is filled with valuable insights, up-to-date news, innovative project highlights and cool new technology updates. RenewableEnergyWorld.com bloggers are truly a crucial part of our website.




1

Energy Storage and Biofuels Top RenewableEnergyWorld.com’s Most Commented Articles of 2014

The online community of readers who visit RenewableEnergyWorld.com is an important aspect of the news and information that we offer renewable energy stakeholders. We often post news that we feel will get people to view important topics from new angles, offering insights and opinions about technology, policy and more. Often that leads to engaging and informative discussions that add even more value to the article that we have posted.




1

RenewableEnergyWorld.com's Most-read Articles of 2014

At the close of each year, we like to take a look back to see which stories made an impact on our readers. This year's most read articles show the many twists and turns that the industry took this year and reveal interesting trends for us as editors and for other industry insiders.





1

Ten Clean Energy Stocks: Past Performance and Predictions for 2015

The last two months have not been kind to clean energy stocks. Most commentators attribute the weakness to declining oil prices and the Republicans' strong showing in the midterm elections.




1

The Year Ahead: Top Clean Energy Trends of 2015

For the past 13 years, Clean Edge has published the annual Clean Energy Trends report that has sized the global market for solar, wind, and biofuels and tracked everything from venture capital and stock market activity to total global investments. This year, instead of issuing one single report, we'll be producing infographics, tables, charts, and webinars throughout the year – so be on the lookout in the coming weeks and months.




1

India Clean Energy Investments Rose 13 Percent to $7.9 Billion in 2014

Clean energy investments in India increased to $7.9 billion last year and are expected to surpass $10 billion in 2015.






1

2015: The Clean Economy’s Watershed Year?

In a crammed Washington conference room last week, speaker after speaker seemed to apologize for their ‘broken record’ talking points as Bloomberg New Energy Finance and the Business Council for Sustainable Energy unveiled their annual Factbook. But, of course, they were only being honest — like 2013 before it, 2014 had been an unprecedented year for clean energy.




1

Renewable Energy Roundtable: Production and Investment Tax Policy to be a Top Priority in 2015

The renewable energy industry has come a long way in relatively little time. The costs of renewable technologies continue to go down, while renewable capacities at many utilities continue to go up. Although, in many cases, renewable technology is mature and ready for utility-scale deployment, state and federal production and investment tax policies appear less evolved.