netis RealTek routers with firmware version 2.1.1 suffer from cross site request forgery, backdoor accounts, and weak RBAC control vulnerabilities.
1405872cbefb8ad0515fc44e8e0836e72d1d1fa985cac7c55007bb96d1c5ab5a
PROLiNK H5004NK ADSL routers with firmware version R76S Slt 4WNE1 6.1R suffer from cross site request forgery, backdoor accounts, and weak RBAC control vulnerabilities.
bdc0083d8c236287aee441dabe95d1060e8583de5c8dd2092287038176f12c8e
Red Hat Security Advisory 2015-1905-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that sending requests containing large headers to the Web Console produced a Java OutOfMemoryError in the HTTP management interface. An attacker could use this flaw to cause a denial of service. It was discovered that the EAP Management Console could be opened in an IFRAME, which made it possible to intercept and manipulate requests. An attacker could use this flaw to trick a user into performing arbitrary actions in the Console.
eb89c322dc05195d96293e7b3bd6a45b4ccccfc51fd47a2b7459b5426241ae07
Red Hat Security Advisory 2015-1904-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that sending requests containing large headers to the Web Console produced a Java OutOfMemoryError in the HTTP management interface. An attacker could use this flaw to cause a denial of service. It was discovered that the EAP Management Console could be opened in an IFRAME, which made it possible to intercept and manipulate requests. An attacker could use this flaw to trick a user into performing arbitrary actions in the Console.
7b54a9054616b3b919e4de2504b70a27a7eb58995a4d8000629e3621f0203efa
Kentico CMS version 8.2 suffers from cross site scripting and open redirection vulnerabilities.
bf5430bceca5833078cd3fe552102a9b71dee220b36ee328bc2bb05b17999e42
The UISGCON11 Call For Papers has been announced. It will take place on December 4th, 2015 in Kyiv, Ukraine at Hotel Bratislava.
c708f412a5075e13edd0912b3234378ebb40c8805adc85120c23d3f4795c8f60
CakePHP version 3.0.5 suffers from server-side request forgery attacks that can cause a denial of service condition.
884781604e0f231e38b3b0939d779f308df6b316c6f28e028451352741412abe
Red Hat Security Advisory 2015-1893-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content.
43bba8b4bca2e30a1e577f17f22233ca5ac7d88ec42c034379ae9db4eaa6da1b
This paper investigates the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed. First, they present Logjam, a novel flaw in TLS that lets a man-in-the-middle downgrade connections to "export-grade" Diffie-Hellman. To carry out this attack, the researchers implement the number field sieve discrete log algorithm. After a week-long precomputation for a specified 512-bit group, they can compute arbitrary discrete logs in that group in about a minute. They found that 82% of vulnerable servers use a single 512-bit group, allowing them to compromise connections to 7% of Alexa Top Million HTTPS sites. They go on to consider Diffie-Hellman with 768- and 1024-bit groups. They estimate that even in the 1024-bit case, the computations are plausible given nation-state resources. A small number of fixed or standardized groups are used by millions of servers; performing precomputation for a single 1024-bit group would allow passive eavesdropping on 18% of popular HTTPS sites, and a second group would allow decryption of traffic to 66% of IPsec VPNs and 26% of SSH servers. A close reading of published NSA leaks shows that the agency's attacks on VPNs are consistent with having achieved such a break. They conclude that moving to stronger key exchange methods should be a priority for the Internet community.
34229b5a84df1c71f6a8f6c2fbd22fb444d37a13ea7fdfe2f50f3fe60983e984
Hack4 has announced its Call For Papers. It will be held December 28th through the 29th, 2015 in Berlin, Germany.
9a73e2c5a4a814f1788902cac7b6660fe6c951d88c9799ef03fa833ef6d16d92
Freemake Video Downloader version 3.7.1 suffers from a code execution vulnerability.
b623c67eaabfca25efa85965d5e34b9e469bcfc9ee711a03fd806765c64f6f52
A session fixation web vulnerability has been discovered in the official PayPal Inc online service web application.
e7f3a2ee98a6007695dada23308a7cde55afed0433cc23d02597d45f4e47d928
Ubuntu Security Notice 2709-2 - USN-2709-1 updated pollinate's certificate for entropy.ubuntu.com but did not include a new certificate authority certificate. This update fixes the problem. Various other issues were also addressed.
07405917955cc6e732f12d69492661b1fd9c7275b82debd279393aa8decd20c0
Ubuntu Security Notice 2769-1 - It was discovered that Apache Commons HttpClient did not properly verify the Common Name or subjectAltName fields of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. Florian Weimer discovered the fix for CVE-2012-5783 was incomplete for Apache Commons HttpClient. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. Various other issues were also addressed.
af157aac0460aac84b53a3ba1669f3117b6a436e3293af422b911edc94f82c08
A mitigation added to Windows 10 to prevent NTFS Mount Reparse Points being created at integrity levels below medium can be bypassed.
77de79e37f40866083e8c10c779513ec690df8fde92d656febc29bcad4074191