# SANS ISC

# threatpost.com

# Reddit netsec

# Krebs On Security

  • The Democratization of Censorship Sun, 25 Sep 2016 11:58:47 +0000
    John Gilmore, an American entrepreneur and civil libertarian, once famously quipped that “the Internet interprets censorship as damage and routes around it”. This notion undoubtedly rings true for those who see national governments as the principal threats to free speech.However, events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely powerful cyber weapons with transnational reach.
  • KrebsOnSecurity Hit With Record DDoS Thu, 22 Sep 2016 00:57:06 +0000
    On Tuesday evening, KrebsOnSecurity.com was the target of an extremely large and unusual distributed denial-of-service (DDoS) attack designed to knock the site offline. The attack did not succeed thanks to the hard work of the engineers at Akamai, the company that protects my site from such digital sieges. But according to Akamai, it was nearly double the size of the largest attack they've seen previously, and was among the biggest assaults the Internet has ever witnessed.
  • DDoS Mitigation Firm Has History of Hijacks Tue, 20 Sep 2016 16:15:39 +0000
    Last week, KrebsOnSecurity detailed how BackConnect Inc. -- a company that defends victims against large-scale distributed denial-of-service (DDoS) attacks -- admitted to hijacking hundreds of Internet addresses from a European Internet service provider in order to glean information about attackers who were targeting BackConnect. According to an exhaustive analysis of historic Internet records, the BackConnect appears to have a history of such "hacking back" activity.

# Bruce Schneier's blog

# WIRED Threat Level

# exploit-db.com

# Securiteam

  • Oracle Mysql 5.5.45 Remote Code Execution Vulnerability Wed, 21 Sep 2016 00:00 GMT
    Oracle Mysql is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
  • Oracle Solaris 10 Remote Code Execution Vulnerability Wed, 21 Sep 2016 00:00 GMT
    Oracle Solaris is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
  • Tollgrade Lighthouse Sms 5.1 Obtain Information Vulnerability Wed, 21 Sep 2016 00:00 GMT
    Tollgrade Lighthouse Sms is prone to a gain information vulnerability.This allows local or remote attackers to gain privileges via a malicious program in the affected application
  • Xmlsoft Libxslt Denial Of Service Overflow Memory corruption Vulnerability Wed, 21 Sep 2016 00:00 GMT
    Xmlsoft Libxslt is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors.
  • Xmlsoft Libxslt watchOS Denial Of Service Overflow Memory corruption Vulnerability Wed, 21 Sep 2016 00:00 GMT
    Xmlsoft Libxslt is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors.
  • Adobe Flash Player 11.2.202.626 Windows And OS X Denial Of Service Execute Code Overflow Memory Corruption Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Adobe Flash Player is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors. Adobe Flash Player is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition. Adobe Flash Player is prone to a overflow vulnerability.This allows a remote attackers to execute arbitrary code via crafted packets and cause a denial of service (memory corruption). Adobe Flash Player is prone to a memory corruption vulnerability.This allows a remote attacker to run a arbitrary code in context of a logged in user. It might cause a denial of service conditions if the attack fails.
  • Adobe Flash Player Macintosh Linux Denial Of Service Execute Code Overflow Memory corruption Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
  • Adobe Reader Denial Of Service Execute Code Overflow Memory Corruption Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Adobe Acrobat is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors. Adobe Acrobat is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition. Adobe Acrobat is prone to a overflow vulnerability.This allows a remote attackers to execute arbitrary code via crafted packets and cause a denial of service (memory corruption). Adobe Acrobat is prone to a memory corruption vulnerability.This allows a remote attacker to run a arbitrary code in context of a logged in user. It might cause a denial of service conditions if the attack fails.
  • Adobe Xmp Toolkit 5.1.2 Remote Code Execution Vulnerability Thu, 22 Sep 2016 00:00 GMT
    XMPCore in Adobe XMP Toolkit for Java before 5.1.3 allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
  • Apache Xerces-c++ 3.1.3 Denial Of Service Overflow Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
  • Apple Iphone Os 9.3.2 Obtain Information Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Apple Iphone Os is prone to a gain information vulnerability.This allows local or remote attackers to gain privileges via a malicious program in the affected application
  • Apple Mac Os X 10.11.5 CFNetwork Obtain Information Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Apple Mac Os X is prone to a gain information vulnerability.This allows local or remote attackers to gain privileges via a malicious program in the affected application
  • Apple Safari 9.1.1 Bypass a restriction or similar Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Apple Safari is prone to a bypass vulnerability. This allow an attacker to bypass detection or blocking system, which could allow malware to pass through the system undetected
  • Google Android 6.0.1 Denial Of Service Execute Code Overflow Memory corruption Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Google Android is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors.
  • Google Android 6.0 Denial Of Service Execute Code Memory corruption Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Google Android is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors.
  • Google Chrome Bypass a restriction or similar Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Google Chrome is prone to a bypass vulnerability. This allow an attacker to bypass detection or blocking system, which could allow malware to pass through the system undetected
  • IBM Security Identity Manager Adapter 7.0.0.0 Obtain Information Vulnerability Thu, 22 Sep 2016 00:00 GMT
    IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.1 before 7.0.1-ISS-SIM-FP0003 allows local users to discover cleartext passwords by (1) reading a configuration file or (2) examining a process.
  • Microsoft Edge Cross Site Scripting Obtain Information Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Microsoft Edge is prone to a cross-site scripting vulnerability.This allows remote attackers to inject arbitrary web script or HTML via vulnerable vectors.A remote attacker can use cross-site scripting(XSS) to send a hostile script to an unsuspicious user. Microsoft Edge is prone to a gain information vulnerability.This allows local or remote attackers to gain privileges via a malicious program in the affected application
  • Microsoft Windows 10 1511 Bypass A Restriction Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Microsoft Windows 10 is prone to a bypass vulnerability. This allow an attacker to bypass detection or blocking system, which could allow malware to pass through the system undetected
  • Misys Fusioncapital Opics Plus Execute Code Sql Injection Vulnerability Thu, 22 Sep 2016 00:00 GMT
    Multiple SQL injection vulnerabilities in Misys FusionCapital Opics Plus allow remote authenticated users to execute arbitrary SQL commands via the (1) ID or (2) Branch parameter.