for

NoScript Extension Officially Released For Google Chrome




for

xine-lib.formatstring.patch

Patch for the xine/gxine CD player that was found susceptible to a remote format string bug. The vulnerable code is found in the xine-lib library that both xine and gxine use. The vulnerable versions are at least xine-lib-0.9.13, 1.0, 1.0.1, 1.0.2 and 1.1.0.




for

HPP Protection Patch For ModSecurity 2.5.9

HPP (HTTP Parameter Pollution) protection patch for ModSecurity version 2.5.9.












for

NtUserCheckAccessForIntegrityLevel Use-After-Free Vulnerability

Microsoft Windows Vista / Server 2008 suffer from a NtUserCheckAccessForIntegrityLevel use-after-free vulnerability.




for

BDA MPEG2 Transport Information Filter DLL Hijacking

A DLL side loading vulnerability was found in the BDA MPEG2 Transport Information Filter that ships with Windows Vista. This issue can be exploited by loading the filter as an embedded OLE object. When instantiating the object Windows will try to load the DLL ehTrace.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system.








for

Solaris xlock Information Disclosure

A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow local users to read partial contents of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to escalate privileges in a realistic scenario is unlikely.





for

Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS





for

Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation

A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected.




for

MySQL G0ld Brute Forcing Utility

MySQL G0ld is a program that issues brute force attacks against a MySQL Server using a supplied wordlist.




for

XBOX 360 Aurora 0.6b Default Credentials / FTP Bruteforcer

XBOX 360 Aurora version 0.6b default credential FTP bruteforcing script.




for

Ecommerce Systempay 1.0 Brute Force

Ecommerce Systempay version 1.0 suffers from a production key brute forcing vulnerability.




for

OpenBSD - Call For Donations










for

Alleged Ponzi Mastermind Stanford Pwned In Antigua




for

German Police Storm Bulletproof Data Center In Former NATO Bunker








for

ESET Generic Malformed Archive Bypass

Various ESET products suffer from a malformed archive bypass vulnerability. The parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.




for

Bitdefender Malformed Archive Bypass

The parsing engine for various Bitdefender products supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (HOST_OS) so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating.




for

Bitdefender Generic Malformed Archive Bypass

The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (Compressed Size) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected.




for

Bitdefender Malformed Archive Bypass

The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (RAR Compression Information) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected.




for

ESET Generic Malformed Archive Bypass

The ESET parsing engine can be bypassed by specifically manipulating a ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.




for

Kaspersky Generic Malformed Archive Bypass

The Kaspersky parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (File Name length Field) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.




for

Bitdefender Generic Malformed Archive Bypass

The Bitdefender parsing engine supports the GZIP archive format. The parsing engine can be bypassed by specifically manipulating a GZIP Archive (Compression Method) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating.




for

QuickHeal Generic Malformed Archive Bypass

The QuickHeal parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (GPFLAG) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating.




for

Checkview 1.1 For iPhone / iPod Touch Directory Traversal

Checkview version 1.1 for iPhone / iPod Touch suffers from a directory traversal vulnerability.




for

iPhone Forensics On iOS 5

This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone.




for

Forensic Analysis Of iPhone Backups

This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups.