Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-23896PUBLISHED: 2022-06-28Admidio 4.1.2 version is affected by stored cross-site scripting (XSS).
CVE-2022-29519PUBLISHED: 2022-06-28Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware.
CVE-2022-30707PUBLISHED: 2022-06-28
Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CE...
CVE-2022-30997PUBLISHED: 2022-06-28Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware.
CVE-2022-34750PUBLISHED: 2022-06-28
An issue was discovered in MediaWiki through 1.38.1. The lemma length of a Wikibase lexeme is currently capped at a thousand characters. Unfortunately, this length is not validated, allowing much larger lexemes to be created, which introduces various denial-of-service attack vectors within the Wikib...
User Rank: Apprentice
10/14/2015 | 3:56:45 PM
MD4
------
1990 by Ron Rivest based on Merkle Damgard
1991 Boer and Bosselaers - psuedo collisions
Same message with two different sets of initial values.
Linear attack on last 2 rounds.
1 millisecond on a 16 Mhz IBM PS/2
1996 Dobbertin - Semi freestart collisions.
Few seconds on a PC with Pentium processor.
1997 Dobbertin - Found preimages
Takes less than 1 hr on a PC.
2005 Wang - Full Collisions
Uses 2 blocks(1024 bits)
IBM P690 takes about 1 hour to find pair of first blocks.
Fastest cases take only 15 minutes.
15 seconds to 5 minutes to find the pair of second blocks.
SHA-0
----------
1993 by NIST based on MD4
2004 Biham and Chen near-collision
2004 Joux - 4 block full collision - 2^ 51 hash ops
80,000 hours of CPU hrs on a supercomputer with 256 Itanium
2 processors.
2008 boomerang attack
2 ^ 33.6
Takes less than 1 hour of PC
MD5
--------
1991 Ron Rivest
128-bit hash value
1996 Dobbertin - Semi - FreeStart Collisions
2005 Wang - Full collisions
SHA-1
----------
1995 by NIST based on MD4
160-bit hash value
2005 Wang 2005 - Theoretical collision attack
2015 Stevens - Semi- Freestart collisions
All 80 steps
Takes 10 days using
16 * 4 GTX-970 GPUs, 1 Haswell i5-4460 processor and 16GB of RAM
----