w

IBM Warns Zero-Day Hacker Exploits Growing




w

Hands-On With The IBM 5150, Thirty Years Later




w

IBM Designs Computer Chip That Copies How The Brain Works




w

IBM: Mind Reading Is Less Than Five Years Away. For Real.







w

IBM PC Pioneer William C Lowe Dies, Aged 72






w

IBM Warns Of Malware On USB Drives Shipped To Customers







w

Would-Be Hacker Vandalizes Vietnam Memorial Site




w

Vietnam - Where Pirated Apps Match Personal Budgets






w

macOS/iOS IOAccelCommandQueue2::processSegmentKernelCommand() Out-Of-Bounds Timestamp Write

macOS and iOS suffers from an out-of-bounds timestamp write in IOAccelCommandQueue2::processSegmentKernelCommand().




w

iOS / macOS AWDL Heap Corruption / Bounds Checking

A remote iOS / macOS heap corruption issue exists due to insufficient bounds checking in AWDL.






w

MPC Sharj 3.11.1 Arbitrary File Download

MPC Sharj version 3.11.1 suffers from an arbitrary file download vulnerability.




w

webTareas 2.0.p8 Arbitrary File Deletion

webTareas version 2.0.p8 suffers from an arbitrary file deletion vulnerability.









w

Hollywood Takes The Bait, Options McAfee Movie














w

Wapiti Web Application Vulnerability Scanner 3.0.2

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.




w

WebSploit Framework 4.0.1

WebSploit is an advanced man-in-the-middle framework.




w

Wapiti Web Application Vulnerability Scanner 3.0.3

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.




w

10Strike LANState 9.32 Host Check hostname Buffer Overflow

10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit.




w

Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer

The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation.




w

XMB - eXtreme Message Board 1.9.11.13 Weak Crypto / Insecure Password Storage

XMB - eXtreme Message Board version 1.9.11.13 suffers from weak crypto and insecure password storage vulnerabilities.




w

XOOPS 2.5.7.2 Weak Crypto

XOOPS version 2.5.7.2 uses weak one way hash crypto MD5 along with unsalted passwords stored in the database.