Cross Site Request Forgery in Netgear Router JNR1010 Version 1.0.0.24

Posted by CSW Research Lab on Jan 11

Hi,

Can you assign CVE id to this flaw?

Details
================

#Product Vendor: Netgear
#Netgear GPL:
http://kb.netgear.com/app/answers/detail/a_id/2649/~/netgear-open-source-code-for-programmers-(gpl)

http://www.gnu.org/licenses/gpl.txt
#Bug Name: Cross Site Request Forgery in Netgear Router JNR1010 Version
1.0.0.24
#Software: Netgear Router JNR1010 Firmware
#Version: 1.0.0.24
#Last Updated: 10-06-2015
<…

Broken Authentication & Improper Session Management in Netgear Router JNR1010 Version 1.0.0.24

Posted by CSW Research Lab on Jan 11

Hi,

Can you assign CVE id to this flaw?

Details
================

#Product Vendor: Netgear
#Netgear GPL:
http://kb.netgear.com/app/answers/detail/a_id/2649/~/netgear-open-source-code-for-programmers-(gpl)

http://www.gnu.org/licenses/gpl.txt
#Bug Name: Broken Authentication & Improper Session Management in Netgear
Router JNR1010 Version 1.0.0.24
#Software: Netgear Router JNR1010 Firmware
#Version: 1.0.0.24
#Last Updated: 10-06-2015
<…

Exploiting XXE vulnerabilities in AMF libraries

Posted by Nicolas Grégoire on Jan 11

Hello,

AMF (aka “Action Message Format”) is a binary format used by Flash
applications communicating with server-side components. A few data types
supported by AMF deal with XML content (for example the “XML Document”
type in AMF0).

In 2015, several AMF libraries (including BlazeDS and PyAMF) were
identified as vulnerable to XXE (aka “XML External Entity”) and SSRF
(aka “Server Side Forgery”) attacks. I…

Questions Linger as Juniper Removes Backdoored Dual_EC RNG

Juniper Networks has removed the backdoored Dual_EC DRBG algorithm from its ScreenOS operating system, but new developments show Juniper deployed Dual_EC long after it was known to be backdoored.

IRS Releases Eighth Security Tip

Original release date: January 11, 2016

The Internal Revenue Service (IRS) has released the eighth in a series of tips intended to help the public protect personal and financial data online and at home. A new tip will be available each Monday through the start of the tax season in January. This tip describes methods users should follow to protect their tax records. Recommendations include encrypting and backing up tax information stored electronically, storing hard copies of tax information under lock and key, and shredding old tax records before disposal.

US-CERT encourages users and administrators to review the IRS Security Awareness Tax Tip Number 8 for additional information.


This product is provided subject to this Notification and this Privacy & Use policy.

FireHOL 3.0.1

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.