el

HtmlHelpchm.txt

The HtmlHelp application (hh.exe) in Microsoft windows read a value from a .CHM file to set a length parameter. By setting this to a large value, it is possible to overwrite sections of the heap with attacker supplied values. Affected software includes: Microsoft Windows 98, 98SE, ME, Microsoft Windows NT 4.0, Microsoft Windows 2000 Service Pack 4, Microsoft Windows XP, Microsoft Windows XP Service Pack 1, Microsoft Windows Server 2003.




el

Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack

Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included.





el

(On-Premises Only) Security advisory for Simulation Process Intelligence (3DOrchestrate Services) on 3DEXPERIENCE: March 11th, 2020

A vulnerability associated with Use of Hard-coded Credentials (CWE-798) exists in Simulation Process Intelligence (3DOrchestrate Services) on premises licensed program. The security risk is evaluated as High (CVSS v.3.0 Base Score 8.0) and affects all 3DEXPERIENCE releases (from 3DEXPERIENCE R2014x to 3DEXPERIENCE R2020x).




el

T23-2020 Notification regarding BIOVIA Pipeline Pilot Chemistry 2019 Hot Fix 3

BIOVIA Pipeline Pilot Chemistry SDK 2019




el

T24-2020 Notification regarding BIOVIA Pipeline Pilot Chemistry 2020 Hot Fix 1

BIOVIA Pipeline Pilot Chemistry SDK 2020







el

Hacker Admits Stealing, Reselling VoIP Services




el

Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000







el

Steel-Woven Wallet Pledges To Keep RFID Credit Cards Safe




el

European Commission Launches New Industry Guidelines On RFID Privacy






el

Syrian Electronic Army Gets Dose Of Own Medicine




el

Syrian Electronic Army Claims CNN As Its Latest Victim










el

Telerik ASP.NET AJAX RadEditor Control 2014.1.403.35 XSS

Telerik ASP.NET AJAX RadEditor Control versions 2014.1.403.35 and 2009.3.1208.20 suffer from a persistent cross site scripting vulnerability.




el

ASP Webshell For IIS 8

ASP webshell backdoor designed specifically for IIS 8.




el

ZyXEL P-660HN-T1 V2 Missing Authentication / Password Disclosure

The ZyXEL P-660HN-T1 V2 rpWLANRedirect.asp page is missing authentication and discloses an administrator password.




el

Telerik UI Remote Code Execution

The Telerik UI for ASP.NET AJAX insecurely deserializes JSON objects in a manner that results in arbitrary remote code execution on the software's underlying host.









el

Sneaky Malware Disguises Itself As An Adobe Flash Installer






el

Adobe Releases Patch For Critical Code Execution Vulnerability






el

TOR Virtual Network Tunneling Tool 0.4.0.5

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).




el

TOR Virtual Network Tunneling Tool 0.4.1.5

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).




el

TOR Virtual Network Tunneling Tool 0.4.1.6

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).




el

TOR Virtual Network Tunneling Tool 0.4.2.5

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).




el

TOR Virtual Network Tunneling Tool 0.4.2.6

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).




el

TOR Virtual Network Tunneling Tool 0.4.2.7

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).




el

The R.A.T In The Shell

This whitepaper is an analysis of the breach into the Kudankulam Nuclear Power Plant through the lens of Cyber Kill Chain, the study of remote access trojans, and the targeting of critical infrastructure.




el

Telnet Backdoor Opens More Than 1M IoT Radios To Hijack