From the low-hanging-fruit-department
ESET Generic Malformed Archive Bypass (ZIP Compression Information)
Release mode: Coordin
From the low-hanging-fruit-department
Kaspersky Generic Malformed Archive Bypass (ZIP GFlag)
Release mode: Coordinated Dis
From the low-hanging-fruit-department
AVIRA Generic Malformed Container bypass (ISO)
Release mode: Silent
Dear subscribers,
we're sharing our latest advisory with you and like to thank everyone who
contributed in finding and solving those vulnerabilities. Feel free to join our
bug bounty programs (open-xchange, appsuite, dovecot, powerdns) at HackerOne.
Yours sincerely,
Martin Heiland, Open-Xchange
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
CA20191218-01: Security Notice for CA Client Automation Agent for
Windows
Issued: December 18, 2019
Last Updated: December 18, 2019
CA Technologies, A Broadcom Company, is alerting customers to a
potential risk with CA Client Automation agent on Wi
Dear list,
We've released new BlackArch Linux ISOs and OVA image (version
2020.01.01). Many improvements and QA went through all packages and
tools Blackarch Linux offers! For details see the ChangeLog below. The
BlackArch repository, Live-ISO and OVA image include more than 2400
tools now. The a
[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-.GROUP-FILE-URL-FIELD-CODE-EXECUTION.txt
[+] twitter.com/hyp3rlinx
[+] apparitionsec@gmail
[+] ISR: Apparition Security
[Vendor]
www.microsoft.com
I. VULNERABILITY
-
Microsoft Exchange Server, External Service Interaction (DNS)
Exchange Server 2013 CU22 and previous.
II. CVE REFERENCE
-
Not Assigned Yet
III. VENDOR
-
https://www.microsoft.com
IV. DESCRIPTION
--