I’ve improved the code and made most of the source-code parameters
also configurable via the command line.
I’ve also added the row-hammer assembly code itself.
The problem:
* The page fixation code is tested and seems to be 100% reliable and
quite fast.
* The row-hammer code is completely untested as I have no 64-bit
hardware affected by rowhammer. Hence the statistics optimization code
is incomplete.
# The Palinopsia Bug
## Is your VirtualBox reading your E-Mail? Reconstruction of
FrameBuffers from VRAM
This document describes a method of reading and displaying previously
used framebuffers from a variety of popular graphics cards. In all 4
tested laptops the content of the VRAM was not erased upon reboot.
It is also possible to show that the content of the host VRAM can be…
Advisory: Multiple reflecting/stored XSS- and SQLi-vulnerabilities in
openEMR v.4.2.0
Advisory ID: SROEADV-2015-08
Author: Steffen Rösemann
Affected Software: openEMR v.4.2.0 (Release-date: 28th Dec 2014)
Vendor URL: http://www.open-emr.org
Vendor Status: patched
CVE-ID: to be assigned after release of advisory via OSS list
XML External Entity (XXE) Injection Vulnerability in Apache Batik (Java
SVG Toolkit)
====================================================================================
Researcher: Kevin Schaller <kschaller () ernw de>
Description
===========
Batik is a Java-based toolkit for applications or applets that want to
use images in the
Scalable Vector Graphics (SVG) format for various purposes, such as
display, generation or
manipulation. [1]…
The Inetc plugin for Nullsoft Scriptable Install System (NSIS), as used in CERT/CC Failure Observation Engine (FOE) and other products, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and possibly execute arbitrary code by sending a crafted certificate in a download session for Windows executable files.
Researchers at INRIA and Xamarin discovered several vulnerabilities in
mono, a platform for running and developing applications based on the
ECMA/ISO Standards. Mono’s TLS stack contained several problems that
hampered its capabilities: those issues could lead to client
impersonation (via SKIP-TLS), SSLv2 fallback, and encryption weakening
(via FREAK).
Multiple security issues have been found in Iceweasel, Debian’s version
of the Mozilla Firefox web browser. The Common Vulnerabilities and
Exposures project identifies the following problems: