[FD] [TZO-03-2020] ESET Generic Malformed Archive Bypass (ZIP Compression Information)

2020-01-03 Thread Thierry Zoller
From the low-hanging-fruit-department ESET Generic Malformed Archive Bypass (ZIP Compression Information) Release mode: Coordin

[FD] [TZO-02-2020] Kaspersyk Generic Malformed Archive Bypass (ZIP GFlag)

2020-01-03 Thread Thierry Zoller
From the low-hanging-fruit-department Kaspersky Generic Malformed Archive Bypass (ZIP GFlag) Release mode: Coordinated Dis

[FD] [TZO-01-2020] AVIRA Generic Malformed Container bypass (ISO)

2020-01-03 Thread Thierry Zoller
From the low-hanging-fruit-department AVIRA Generic Malformed Container bypass (ISO) Release mode: Silent

[FD] Open-Xchange Security Advisory 2020-01-02

2020-01-03 Thread Open-Xchange GmbH via Fulldisclosure
Dear subscribers, we're sharing our latest advisory with you and like to thank everyone who contributed in finding and solving those vulnerabilities. Feel free to join our bug bounty programs (open-xchange, appsuite, dovecot, powerdns) at HackerOne. Yours sincerely, Martin Heiland, Open-Xchange

[FD] CA20191218-01: Security Notice for CA Client Automation Agent for Windows

2020-01-03 Thread Kevin Kotas via Fulldisclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 CA20191218-01: Security Notice for CA Client Automation Agent for Windows Issued: December 18, 2019 Last Updated: December 18, 2019 CA Technologies, A Broadcom Company, is alerting customers to a potential risk with CA Client Automation agent on Wi

[FD] New BlackArch Linux ISOs + OVA Image available!

2020-01-03 Thread Black Arch
Dear list, We've released new BlackArch Linux ISOs and OVA image (version 2020.01.01). Many improvements and QA went through all packages and tools Blackarch Linux offers! For details see the ChangeLog below. The BlackArch repository, Live-ISO and OVA image include more than 2400 tools now. The a

[FD] Microsoft Windows .Group File / URL Field Code Execution

2020-01-03 Thread hyp3rlinx
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-.GROUP-FILE-URL-FIELD-CODE-EXECUTION.txt [+] twitter.com/hyp3rlinx [+] apparitionsec@gmail [+] ISR: Apparition Security [Vendor] www.microsoft.com

[FD] Microsoft Exchange Server, External Service Interaction (DNS)

2020-01-03 Thread Alphan YAVAS
I. VULNERABILITY - Microsoft Exchange Server, External Service Interaction (DNS) Exchange Server 2013 CU22 and previous. II. CVE REFERENCE - Not Assigned Yet III. VENDOR - https://www.microsoft.com IV. DESCRIPTION --