In this paper the author demonstrates how spinning hard-drives' service areas can be used to hide data from the operating-system (or any software using the standard OS's API or the standard ATA commands to access the hard-drive). These reserved areas are used by hard-drive vendors to store modules that in turn operate the drive, and in a sense, together with the ROM, serve as the hard-drive’s internal storage and OS. By sending Vendor Specific Commands (VSCs) directly to the hard-drive, one can manipulate these areas to read and write data that are otherwise inaccessible. This should not be confused with DCO or HPA which can be easily detected, removed and accessed via standard ATA commands.
56c7d0d4187efd4b11c8476ff27ccc113b0205c32f936a78c17c88cafa947b3d
FreeBSD Security Advisory - BIND 9 is an implementation of the Domain Name System (DNS) protocols. The named(8) daemon is an Internet Domain Name Server. DNS64 is an IPv6 transition mechanism that will return a synthesized AAAA response even if there is only an A record available. Due to a software defect a crafted query can cause named(8) to crash with an assertion failure.
7a8b0adfcf6016b307c0e17b5c45fdec29ac76e9591aba0e5450056bd38ad916
FreeBSD Security Advisory - The glob(3) function is a pathname generator that implements the rules for file name pattern matching used by the shell. GLOB_LIMIT is supposed to limit the number of paths to prevent against memory or CPU attacks. The implementation however is insufficient. An attacker that is able to exploit this vulnerability could cause excessive memory or CPU usage, resulting in a denial of service.
f2e502ca64a6aa303c90908a48c574ac08e6abef1995c2a730359cea8c7e9fec
Bricks is a web application security learning platform built on PHP and MySQL. The project focuses on variations of commonly seen application security issues. Each 'Brick' has some sort of security issue which can be leveraged manually or using automated software tools. The mission is to 'Break the Bricks' and thus learn the various aspects of web application security. Bricks is a completely free and open source project brought to you by OWASP.
f3e19532950821b7e4e8be8f975a13a51aa346f3186c6e45ca89fc5b7386dc28
Kodak's Insite Creative Workflow System suffers from a remote SQL injection vulnerability.
dfd8885731a743f54a2b98717b42b9119da28cb80197e4c3bcd619044a40a31f
Red Hat Security Advisory 2013-0270-01 - The Jakarta Commons HttpClient component can be used to build HTTP-aware client applications. The Jakarta Commons HttpClient component did not verify that the server hostname matched the domain name in the subject's Common Name or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name. All users of jakarta-commons-httpclient are advised to upgrade to these updated packages, which correct this issue. Applications using the Jakarta Commons HttpClient component must be restarted for this update to take effect.
af53df44563319536fdb4f79b98fb9e261956bbde7062a8807de4b5a1079804c
Red Hat Security Advisory 2013-0271-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. It was found that, after canceling a proxy server's authentication prompt, the address bar continued to show the requested site's address. An attacker could use this flaw to conduct phishing attacks by tricking a user into believing they are viewing a trusted site.
7ba6d8ae97e003c7ecb415a182499f52ce0de1d8723d72ffae4b6ec98bd321a9
Since 2004, Mandiant has investigated computer security breaches at hundreds of organizations around the world. The majority of these security breaches are attributed to advanced threat actors referred to as the "Advanced Persistent Threat" (APT). They first published details about the APT in their January 2010 M-Trends report. As they stated in the report, their position was that "The Chinese government may authorize this activity, but there's no way to determine the extent of its involvement." Now, three years later, they have the evidence required to change their assessment. The details they have analyzed during hundreds of investigations have convinced them that the groups conducting these activities are based primarily in China and that the Chinese Government is aware of them.
1b3f3823efbf29735c351791998505a39d8807b0c3599ce1e8c1d5b0fab9843c
Red Hat Security Advisory 2013-0269-01 - Apache Axis is an implementation of SOAP. It can be used to build both web service clients and servers. Apache Axis did not verify that the server hostname matched the domain name in the subject's Common Name or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name. All users of axis are advised to upgrade to these updated packages, which correct this issue. Applications using Apache Axis must be restarted for this update to take effect.
d9cdac0fcd5149ca0ace42fe10b6132c75222c4606964c787f153fd6985357f9
Red Hat Security Advisory 2013-0268-01 - Apache Tomcat is a servlet container. It was found that sending a request without a session identifier to a protected resource could bypass the Cross-Site Request Forgery prevention filter. A remote attacker could use this flaw to perform CSRF attacks against applications that rely on the CSRF prevention filter and do not contain internal mitigation for CSRF. Warning: Before applying the update, back up your existing JBoss Enterprise Web Server installation .
94eee7960c392c24e87d8653bcee0f0ecd29a942c28785158881dbcf707cc305
Red Hat Security Advisory 2013-0267-01 - Apache Tomcat is a servlet container. It was found that sending a request without a session identifier to a protected resource could bypass the Cross-Site Request Forgery prevention filter. A remote attacker could use this flaw to perform CSRF attacks against applications that rely on the CSRF prevention filter and do not contain internal mitigation for CSRF. Warning: Before applying the update, back up your existing JBoss Enterprise Web Server installation .
ada87f1cd23add09ede83792a895ace408134083633cc2e27cd811e66fc79145
Red Hat Security Advisory 2013-0266-01 - Apache Tomcat is a servlet container. It was found that sending a request without a session identifier to a protected resource could bypass the Cross-Site Request Forgery prevention filter. A remote attacker could use this flaw to perform CSRF attacks against applications that rely on the CSRF prevention filter and do not contain internal mitigation for CSRF. A flaw was found in the way Tomcat handled sendfile operations when using the HTTP NIO connector and HTTPS. A remote attacker could use this flaw to cause a denial of service. The HTTP NIO connector is used by default in JBoss Enterprise Web Server. The Apache Portable Runtime connector from the Tomcat Native library was not affected by this flaw.
838e0b0453161e876d6ad39703ceea8e53d3dc5c7776541bd1681cd631c9061c
This archives lets you access more than 3,000 APT1 indicators including domain names, IP addresses, X.509 encryption certificates and MD5 hashes of malware in APT1's arsenal of digital weapons.
315f3c19f14b4adc1e2c28ef69eef91c1a63e02e0e24f73d5d28f72e58ea29af
Red Hat Security Advisory 2013-0265-01 - Apache Tomcat is a servlet container. It was found that sending a request without a session identifier to a protected resource could bypass the Cross-Site Request Forgery prevention filter. A remote attacker could use this flaw to perform CSRF attacks against applications that rely on the CSRF prevention filter and do not contain internal mitigation for CSRF. A flaw was found in the way Tomcat handled sendfile operations when using the HTTP NIO connector and HTTPS. A remote attacker could use this flaw to cause a denial of service. The HTTP NIO connector is used by default in JBoss Enterprise Web Server. The Apache Portable Runtime connector from the Tomcat Native library was not affected by this flaw.
6511b80f8afd37774dceb238e867e6df16dccae6e5a11cbab1bec49a8584d7f2
This advisory alerts you of a potential security issue with your Foswiki installation. A vulnerability has been reported against the core Perl module CPAN:Locale::Maketext, which Foswiki uses to provide translations when {UserInterfaceInternationalization} is enabled in the configuration. Because of this vulnerability it may be possible for a user to invoke arbitrary perl modules on the server through a crafted macro.
023db9151bd2be81fe7fb2120f8132f7dc0869271e0ab523331a0d259b93ee55
MyFi Wireless Disk version 1.2 suffers from cross site request forgery, local file inclusion, and remote command injection vulnerabilities.
6ed86f1279f3c02e7df43034482ff6bf89be0c4ffd9b21dc08e458c3678096fe
CKEditor version 4.0.1 suffers from cross site request forgery, cross site scripting, and path disclosure vulnerabilities.
2c20ce891948eae0f4f51822b52a5828b5323feb467a4e2335e8e988ab6aa4ce
RTTucson Quotations Database Script suffers from remote SQL injection and cross site scripting vulnerabilities.
e5827e24c69396c14e4480fd2c50f3fe2ce11d0b285b3482dd4d59c0272dcc18