Posted by Karn Ganeshen on Jun 24
*EdgeCore – Layer2+ Fast Ethernet Standalone Switch ES3526XA Manager –
Multiple Vulnerabilities*
Also rebranded as: *SMC TigerSwitch 10/100 SMC6128L2 Manager*
Object ID:
1.3.6.1.4.1.259.8.1.5
Switch Information
Posted by Karn Ganeshen on Jun 24
*EdgeCore – Layer2+ Fast Ethernet Standalone Switch ES3526XA Manager –
Multiple Vulnerabilities*
Also rebranded as: *SMC TigerSwitch 10/100 SMC6128L2 Manager*
Object ID:
1.3.6.1.4.1.259.8.1.5
Switch Information
Posted by redrain root on Jun 24
TIMELINE
rootredrain submitted a report to Ruby.
show raw
Jun 22nd
Hi,
I would like to report a HTTP Header injection vulnerability in
‘net/http’ that allows attackers to inject arbitrary headers in
request even create a new evil request.
PoC
require ‘net/http’
http = Net::HTTP.new(‘192.168.30.214′,’80’)
res = http.get(“/r.php HTTP/1.1rnx-injection: memeda”)
Example
Server Code:…
Posted by Brandon Perry on Jun 24
Hello lists
Attached is a test case for causing a crash in libical 0.47 (shipped with Thunderbird) and this was also tested against
1.0 (various versions shipped with various email clients).
=================================================================
==24662==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x0000004fbb80 bp 0x7ffd68d966f0 sp
0x7ffd68d96520 T0)
#0 0x4fbb7f in icalproperty_new_clone…
Posted by ERPScan inc on Jun 24
Application: SAP NetWeaver AS JAVA
Versions Affected: SAP Application server for Java 7.2 – 7.4
Vendor URL: http://SAP.com
Bugs: denial of service
Sent: 04.12.2015
Reported: 05.12.2015
Vendor response: 05.12.2015
Date of Public Advisory: 14.03.2016
Reference: SAP Security Note 2259547
Author: Dmitry Yudin (ERPScan) @ret5et
Description
1. ADVISORY INFORMATION
Title: SAP Application server for Java – DoS vulnerability
Advisory…
Posted by Francisco Amato on Jun 24
Faraday is the Integrated Multiuser Risk Environment you were looking
for! It maps and leverages all the knowledge you generate in real
time, letting you track and understand your audits. Our dashboard for
CISOs and managers uncovers the impact and risk being assessed by the
audit in real-time without the need for a single email. Developed with
a specialized set of functionalities that help users improve their own
work, the main purpose is to…
Posted by ERPScan inc on Jun 24
Application: SAP NetWeaver AS JAVA
Versions Affected: SAP NetWeaver AS JAVA 7.2 – 7.4
Vendor URL: http://SAP.com
Bugs: denial of service
Sent: 04.12.2015
Reported: 05.12.2015
Vendor response: 05.12.2015
Date of Public Advisory: 14.03.2016
Reference: SAP Security Note 2256185
Author: Dmitry Yudin (ERPScan) @ret5et
Description
1. ADVISORY INFORMATION
Title: SAP JAVA AS icman – DoS vulnerability
Advisory ID:…
Stack-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.30 allows remote attackers to execute arbitrary code via a crafted filename field in a ZIP archive in a vlp file.
Unspecified ActiveX controls in Advantech WebAccess before 8.1_20160519 allow remote authenticated users to obtain sensitive information or modify data via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.
Buffer overflow in Advantech WebAccess before 8.1_20160519 allows local users to cause a denial of service via a crafted DLL file.
Original release date: June 24, 2016
The Internal Revenue Service (IRS) has issued two news releases addressing new safeguards to protect taxpayers and strengthen authentication requirements. The electronic filing (e-File) PIN, an alternative signature verification tool used to assist with electronic tax filing, will no longer be available after suspicious activity was recently detected. Additionally, new requirements are in place to enhance validation for participants using the Income Verification Express Service (IVES), a service used to verify loan applicants’ incomes.
US-CERT encourages users and administrators to review the IRS news releases e-File PIN and Steps to Strengthen IVES Program for details and refer to US-CERT Security Tip ST04-013 for information on protecting your privacy.
This product is provided subject to this Notification and this Privacy & Use policy.