Bugtraq: [SECURITY] [DSA 3693-1] libgd2 security update
[SECURITY] [DSA 3693-1] libgd2 security update
View ArticleMaldoc VBA Anti-Analysis: Video, (Mon, Oct 17th)
Saturday I posted my Maldoc VBA Anti-Analysis diary entry: I step through the analysis of a malicious document that tries to detect (automated) analysis environments. Here is a video of the analysis...
View ArticleVuln: WordPress 'tidio-form' Plugin Cross Site Scripting Vulnerability
WordPress 'tidio-form' Plugin Cross Site Scripting Vulnerability
View ArticleVuln: WordPress tera-charts Plugin 'treemap.php' Cross Site Scripting...
WordPress tera-charts Plugin 'treemap.php' Cross Site Scripting Vulnerability
View ArticleBugtraq: [ERPSCAN-16-030] SAP NetWeaver - buffer overflow vulnerability
[ERPSCAN-16-030] SAP NetWeaver - buffer overflow vulnerability
View ArticleVuln: Motorola Multiple Devices For Android Local Privilege Escalation...
Motorola Multiple Devices For Android Local Privilege Escalation Vulnerability
View ArticleVuln: Libdwarf 'dwarf_util.c' Heap Based Buffer Overflow Vulnerability
Libdwarf 'dwarf_util.c' Heap Based Buffer Overflow Vulnerability
View ArticleVuln: Linux Kernel CVE-2016-6136 Local Information Disclosure Vulnerability
Linux Kernel CVE-2016-6136 Local Information Disclosure Vulnerability
View ArticleVuln: PHP LibGD CVE-2016-8670 Stack Buffer Overflow Vulnerability
PHP LibGD CVE-2016-8670 Stack Buffer Overflow Vulnerability
View ArticleHacked Republican website skimmed donor credit cards for 6 months
Enlarge A website used to fund the campaigns of Republican senators was infected with malware that for more than six months collected donors' personal information, including full names, addresses, and...
View ArticleVuln: ASUS RP-AC52 Access Point Multiple Security Vulnerabilities
ASUS RP-AC52 Access Point Multiple Security Vulnerabilities
View ArticleVuln: ImageMagick 'pixel-accessor.h' Heap Buffer Overflow Vulnerability
ImageMagick 'pixel-accessor.h' Heap Buffer Overflow Vulnerability
View ArticleDefense contractor “white hat” tells FBI that Judicial Watch paid him to hunt...
Enlarge / Excerpt of an FBI interview report detailing a Judicial Watch deal with a defense contractor to search for hacked Clinton files. More records from the Federal Bureau of Investigation's...
View ArticleVuln: GraphicsMagick CVE-2016-8682 Stack Based Buffer Overflow Vulnerability
GraphicsMagick CVE-2016-8682 Stack Based Buffer Overflow Vulnerability
View ArticleVuln: GraphicsMagick CVE-2016-8683 Denial of Service Vulnerability
GraphicsMagick CVE-2016-8683 Denial of Service Vulnerability
View ArticleVuln: Libdwarf 'dwarf_util.c' Heap Buffer Overflow Vulnerability
Libdwarf 'dwarf_util.c' Heap Buffer Overflow Vulnerability
View ArticleISC Stormcast For Tuesday, October 18th 2016...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleOpenSSH Protocol Mismatch In Response to SSL Client Hello, (Tue, Oct 18th)
One reason you can tell your friends like you: They will share packets with you :) . One such friend sent me an interesting packet capture this weekend: And SSH Protocol Mismatch Error in response to...
View ArticleTrump Organization uses really, really insecure e-mail servers. Sad!
(credit: Gage Skidmore) Hillary Clinton isn't the only one who may have had an e-mail security problem. A security researcher has discovered that the Trump Organization's mail servers all run on a...
View ArticleBugtraq: [SECURITY] [DSA 3694-1] tor security update
[SECURITY] [DSA 3694-1] tor security update
View Article