cr

Adobe Fixes Critical Code Execution Flaws In Latest Patch Update










cr

Adobe Patch Update Squashes Critical Code Execution Bugs




cr

Adobe Fixes Critical Security Flaws In Flash, ColdFusion, Campaign





cr

Adobe Releases Patch For Critical Code Execution Vulnerability





cr

Microsoft Taps Eric Holder To Audit AnyVision Face Recognition





cr

Microsoft Warns Of Hacking Group Targeting Vulnerable Web Servers















cr

Microsoft-Vietnam Cement Anti-Piracy Deal





cr

SuperBackup 2.0.5 Persistent Cross Site Scripting

SuperBackup version 2.0.5 for iOS suffers from a persistent cross site scripting vulnerability.




cr

AirDisk Pro 5.5.3 Persistent Cross Site Scripting

AirDisk Pro version 5.5.3 for iOS suffers from multiple persistent cross site scripting vulnerabilities.




cr

Folder Lock 3.4.5 Cross Site Scripting

Folder Lock version 3.4.5 for iOS suffers from multiple cross site scripting vulnerabilities.




cr

Sky File 2.1.0 Cross Site Scripting / Directory Traversal

Sky File version 2.1.0 for iOS suffers from cross site scripting and directory traversal vulnerabilities.















cr

Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer

The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation.




cr

RSA BSAFE Crypto Attacks / Denial Of Service

RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, SSL-J and SSL-C all suffer from various crypto, denial of service, and underflow vulnerabilities.




cr

XMB - eXtreme Message Board 1.9.11.13 Weak Crypto / Insecure Password Storage

XMB - eXtreme Message Board version 1.9.11.13 suffers from weak crypto and insecure password storage vulnerabilities.




cr

XOOPS 2.5.7.2 Weak Crypto

XOOPS version 2.5.7.2 uses weak one way hash crypto MD5 along with unsalted passwords stored in the database.




cr

RSA BSAFE Crypto-J Cryptography Failure

RSA BSAFE Crypto-J versions prior to 6.2.2 suffer from improper OCSP validation and PKCS#12 timing attack vulnerabilities.




cr

RSA BSAFE Micro Edition Suite / Crypto-C Micro Edition Overflow / DoS

RSA BSAFE Micro Edition Suite and Crypto-C Micro Edition suffer from resource exhaustion, integer overflow, improper clearing of heap memory, covert timing channel, and buffer over-read vulnerabilities.




cr

RSA BSAFE SSL-J / Crypto-J Heap Clearing / Timing Channel

RSA BSAFE SSL-J versions prior to 6.2.4 contain a heap inspection vulnerability that could allow an attacker with physical access to the system to recover sensitive key material. RSA BSAFE SSL-J versions prior to 6.2.4 contain a covert timing channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be able to recover a RSA key. RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a covert timing channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key.