-
Notifications
You must be signed in to change notification settings - Fork 0
/
nccgroup.xml
6005 lines (6005 loc) · 436 KB
/
nccgroup.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<?xml version='1.0' encoding='UTF-8'?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
<channel>
<title>nccgroup</title>
<link>https://research.nccgroup.com/</link>
<description>RSS feed generated from the links at https://research.nccgroup.com/</description>
<docs>http://www.rssboard.org/rss-specification</docs>
<generator>python-feedgen</generator>
<lastBuildDate>Fri, 21 Apr 2023 12:15:48 +0000</lastBuildDate>
<item>
<title>Attacking the Windows Kernel (Black Hat Las Vegas 2007)</title>
<link>https://research.nccgroup.com/2015/04/30/attacking-the-windows-kernel-black-hat-las-vegas-2007/</link>
<description>Attacking the Windows Kernel (Black Hat Las Vegas 2007)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/04/30/attacking-the-windows-kernel-black-hat-las-vegas-2007/</guid>
</item>
<item>
<title>Automated enumeration of email filtering solutions</title>
<link>https://research.nccgroup.com/2015/04/30/automated-enumeration-of-email-filtering-solutions/</link>
<description>Automated enumeration of email filtering solutions</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/04/30/automated-enumeration-of-email-filtering-solutions/</guid>
</item>
<item>
<title>BlackBerry PlayBook Security – Part One</title>
<link>https://research.nccgroup.com/2015/04/30/blackberry-playbook-security-part-one/</link>
<description>BlackBerry PlayBook Security – Part One</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/04/30/blackberry-playbook-security-part-one/</guid>
</item>
<item>
<title>BlackBerry PlayBook Security – Part Two – BlackBerry Bridge</title>
<link>https://research.nccgroup.com/2015/04/30/blackberry-playbook-security-part-two-blackberry-bridge/</link>
<description>BlackBerry PlayBook Security – Part Two – BlackBerry Bridge</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/04/30/blackberry-playbook-security-part-two-blackberry-bridge/</guid>
</item>
<item>
<title>Black Hat Europe 2013 Andy Davis: To dock or not to dock…</title>
<link>https://research.nccgroup.com/2015/04/30/black-hat-europe-2013-andy-davis-to-dock-or-not-to-dock/</link>
<description>Black Hat Europe 2013 Andy Davis: To dock or not to dock…</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/04/30/black-hat-europe-2013-andy-davis-to-dock-or-not-to-dock/</guid>
</item>
<item>
<title>Assuring Your DDoS Defences</title>
<link>https://research.nccgroup.com/2015/05/13/assuring-your-ddos-defences/</link>
<description>Assuring Your DDoS Defences</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/assuring-your-ddos-defences/</guid>
</item>
<item>
<title>Symantec PC Anywhere Remote Code Extecution</title>
<link>https://research.nccgroup.com/2015/05/13/symantec-pc-anywhere-remote-code-extecution/</link>
<description>Symantec PC Anywhere Remote Code Extecution</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/symantec-pc-anywhere-remote-code-extecution/</guid>
</item>
<item>
<title>Symantec Messaging Gateway – Unauthorised SSH access</title>
<link>https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-unauthorised-ssh-access/</link>
<description>Symantec Messaging Gateway – Unauthorised SSH access</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-unauthorised-ssh-access/</guid>
</item>
<item>
<title>Symantec Messaging Gateway – Unauthenticated detailed version disclosure</title>
<link>https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-unauthenticated-detailed-version-disclosure/</link>
<description>Symantec Messaging Gateway – Unauthenticated detailed version disclosure</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-unauthenticated-detailed-version-disclosure/</guid>
</item>
<item>
<title>Symantec Messaging Gateway – Out of band stored XSS via email</title>
<link>https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-out-of-band-stored-xss-via-email/</link>
<description>Symantec Messaging Gateway – Out of band stored XSS via email</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-out-of-band-stored-xss-via-email/</guid>
</item>
<item>
<title>Symantec Messaging Gateway – Authenticated arbritary file download</title>
<link>https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-authenticated-arbritary-file-download/</link>
<description>Symantec Messaging Gateway – Authenticated arbritary file download</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-authenticated-arbritary-file-download/</guid>
</item>
<item>
<title>Symantec Messaging Gateway – Addition of a backdoor adminstrator via CSRF</title>
<link>https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-addition-of-a-backdoor-adminstrator-via-csrf/</link>
<description>Symantec Messaging Gateway – Addition of a backdoor adminstrator via CSRF</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/symantec-messaging-gateway-addition-of-a-backdoor-adminstrator-via-csrf/</guid>
</item>
<item>
<title>Symantec Message Filter Unauthenticated verbose software version information disclosure</title>
<link>https://research.nccgroup.com/2015/05/13/symantec-message-filter-unauthenticated-verbose-software-version-information-disclosure/</link>
<description>Symantec Message Filter Unauthenticated verbose software version information disclosure</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/symantec-message-filter-unauthenticated-verbose-software-version-information-disclosure/</guid>
</item>
<item>
<title>Symantec Message Filter Session Hijacking via session</title>
<link>https://research.nccgroup.com/2015/05/13/symantec-message-filter-session-hijacking-via-session/</link>
<description>Symantec Message Filter Session Hijacking via session</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/symantec-message-filter-session-hijacking-via-session/</guid>
</item>
<item>
<title>Solaris 11 USB hubclass</title>
<link>https://research.nccgroup.com/2015/05/13/solaris-11-usb-hubclass/</link>
<description>Solaris 11 USB hubclass</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/solaris-11-usb-hubclass/</guid>
</item>
<item>
<title>Samba on the BlackBerry PlayBook</title>
<link>https://research.nccgroup.com/2015/05/13/samba-on-the-blackberry-playbook/</link>
<description>Samba on the BlackBerry PlayBook</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/samba-on-the-blackberry-playbook/</guid>
</item>
<item>
<title>Samba Andx Request Remote Code Execution</title>
<link>https://research.nccgroup.com/2015/05/13/samba-andx-request-remote-code-execution/</link>
<description>Samba Andx Request Remote Code Execution</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/samba-andx-request-remote-code-execution/</guid>
</item>
<item>
<title>PRTG Network Monitor Command injection</title>
<link>https://research.nccgroup.com/2015/05/13/prtg-network-monitor-command-injection/</link>
<description>PRTG Network Monitor Command injection</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/prtg-network-monitor-command-injection/</guid>
</item>
<item>
<title>OS X Lion USB Hub Class Descriptor Arbitrary Code Execution</title>
<link>https://research.nccgroup.com/2015/05/13/os-x-lion-usb-hub-class-descriptor-arbitrary-code-execution/</link>
<description>OS X Lion USB Hub Class Descriptor Arbitrary Code Execution</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/os-x-lion-usb-hub-class-descriptor-arbitrary-code-execution/</guid>
</item>
<item>
<title>Oracle Retail Invoice Manager SQL Injection</title>
<link>https://research.nccgroup.com/2015/05/13/oracle-retail-invoice-manager-sql-injection/</link>
<description>Oracle Retail Invoice Manager SQL Injection</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/oracle-retail-invoice-manager-sql-injection/</guid>
</item>
<item>
<title>Oracle Retail Integration Bus Manager Directory Traversal</title>
<link>https://research.nccgroup.com/2015/05/13/oracle-retail-integration-bus-manager-directory-traversal/</link>
<description>Oracle Retail Integration Bus Manager Directory Traversal</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/oracle-retail-integration-bus-manager-directory-traversal/</guid>
</item>
<item>
<title>Oracle 11g TNS listener remote Null Pointer Dereference</title>
<link>https://research.nccgroup.com/2015/05/13/oracle-11g-tns-listener-remote-null-pointer-dereference/</link>
<description>Oracle 11g TNS listener remote Null Pointer Dereference</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/oracle-11g-tns-listener-remote-null-pointer-dereference/</guid>
</item>
<item>
<title>Oracle 11g TNS listener remote Invalid Pointer Read</title>
<link>https://research.nccgroup.com/2015/05/13/oracle-11g-tns-listener-remote-invalid-pointer-read/</link>
<description>Oracle 11g TNS listener remote Invalid Pointer Read</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/oracle-11g-tns-listener-remote-invalid-pointer-read/</guid>
</item>
<item>
<title>NX Server for Linux Arbitrary Files can be read with root privileges</title>
<link>https://research.nccgroup.com/2015/05/13/nx-server-for-linux-arbitrary-files-can-be-read-with-root-privileges/</link>
<description>NX Server for Linux Arbitrary Files can be read with root privileges</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/nx-server-for-linux-arbitrary-files-can-be-read-with-root-privileges/</guid>
</item>
<item>
<title>Nagios XI Network Monitor Stored and Reflected XSS</title>
<link>https://research.nccgroup.com/2015/05/13/nagios-xi-network-monitor-stored-and-reflected-xss/</link>
<description>Nagios XI Network Monitor Stored and Reflected XSS</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/nagios-xi-network-monitor-stored-and-reflected-xss/</guid>
</item>
<item>
<title>Medium Risk Vulnerability in Symantec Network Access Control</title>
<link>https://research.nccgroup.com/2015/05/13/medium-risk-vulnerability-in-symantec-network-access-control/</link>
<description>Medium Risk Vulnerability in Symantec Network Access Control</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/medium-risk-vulnerability-in-symantec-network-access-control/</guid>
</item>
<item>
<title>Medium Risk Vulnerability in Symantec Enterprise Security Management</title>
<link>https://research.nccgroup.com/2015/05/13/medium-risk-vulnerability-in-symantec-enterprise-security-management/</link>
<description>Medium Risk Vulnerability in Symantec Enterprise Security Management</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/medium-risk-vulnerability-in-symantec-enterprise-security-management/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance Session hijacking and bypassing client-side session timeouts</title>
<link>https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-session-hijacking-and-bypassing-client-side-session-timeouts/</link>
<description>McAfee Email and Web Security Appliance Session hijacking and bypassing client-side session timeouts</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-session-hijacking-and-bypassing-client-side-session-timeouts/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance Reflective XSS allowing an attacker to gain session tokens</title>
<link>https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-reflective-xss-allowing-an-attacker-to-gain-session-tokens/</link>
<description>McAfee Email and Web Security Appliance Reflective XSS allowing an attacker to gain session tokens</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-reflective-xss-allowing-an-attacker-to-gain-session-tokens/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance Password hashes can be recovered from a system backup and easily cracked</title>
<link>https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-password-hashes-can-be-recovered-from-a-system-backup-and-easily-cracked/</link>
<description>McAfee Email and Web Security Appliance Password hashes can be recovered from a system backup and easily cracked</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-password-hashes-can-be-recovered-from-a-system-backup-and-easily-cracked/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance Arbitrary file download is possible with a crafted URL, when logged in as any user</title>
<link>https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-arbitrary-file-download-is-possible-with-a-crafted-url-when-logged-in-as-any-user/</link>
<description>McAfee Email and Web Security Appliance Arbitrary file download is possible with a crafted URL, when logged in as any user</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-arbitrary-file-download-is-possible-with-a-crafted-url-when-logged-in-as-any-user/</guid>
</item>
<item>
<title>Bypassing Oracle DBMS_ASSERT (in certain situations)</title>
<link>https://research.nccgroup.com/2015/05/13/bypassing-oracle-dbms_assert-in-certain-situations/</link>
<description>Bypassing Oracle DBMS_ASSERT (in certain situations)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/bypassing-oracle-dbms_assert-in-certain-situations/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance Any logged-in user can bypass controls to reset passwords of other administrators</title>
<link>https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-any-logged-in-user-can-bypass-controls-to-reset-passwords-of-other-administrators/</link>
<description>McAfee Email and Web Security Appliance Any logged-in user can bypass controls to reset passwords of other administrators</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-any-logged-in-user-can-bypass-controls-to-reset-passwords-of-other-administrators/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance Active session tokens of other users are disclosed within the UI</title>
<link>https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-active-session-tokens-of-other-users-are-disclosed-within-the-ui/</link>
<description>McAfee Email and Web Security Appliance Active session tokens of other users are disclosed within the UI</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/mcafee-email-and-web-security-appliance-active-session-tokens-of-other-users-are-disclosed-within-the-ui/</guid>
</item>
<item>
<title>Lumension Device Control Remote Memory Corruption</title>
<link>https://research.nccgroup.com/2015/05/13/lumension-device-control-remote-memory-corruption/</link>
<description>Lumension Device Control Remote Memory Corruption</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/lumension-device-control-remote-memory-corruption/</guid>
</item>
<item>
<title>The Phishing Guide: Understanding & Preventing Phishing Attacks</title>
<link>https://research.nccgroup.com/2015/05/13/the-phishing-guide-understanding-preventing-phishing-attacks/</link>
<description>The Phishing Guide: Understanding & Preventing Phishing Attacks</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/the-phishing-guide-understanding-preventing-phishing-attacks/</guid>
</item>
<item>
<title>Impress Pages CMS Remote Code Execution</title>
<link>https://research.nccgroup.com/2015/05/13/impress-pages-cms-remote-code-execution/</link>
<description>Impress Pages CMS Remote Code Execution</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/impress-pages-cms-remote-code-execution/</guid>
</item>
<item>
<title>Thin Clients: Slim Security</title>
<link>https://research.nccgroup.com/2015/05/13/thin-clients-slim-security/</link>
<description>Thin Clients: Slim Security</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/thin-clients-slim-security/</guid>
</item>
<item>
<title>Threat Profiling Microsoft SQL Server</title>
<link>https://research.nccgroup.com/2015/05/13/threat-profiling-microsoft-sql-server/</link>
<description>Threat Profiling Microsoft SQL Server</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/threat-profiling-microsoft-sql-server/</guid>
</item>
<item>
<title>Image IO Memory Corruption</title>
<link>https://research.nccgroup.com/2015/05/13/image-io-memory-corruption/</link>
<description>Image IO Memory Corruption</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/image-io-memory-corruption/</guid>
</item>
<item>
<title>USB attacks need physical access right? Not any more…</title>
<link>https://research.nccgroup.com/2015/05/13/usb-attacks-need-physical-access-right-not-any-more/</link>
<description>USB attacks need physical access right? Not any more…</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/13/usb-attacks-need-physical-access-right-not-any-more/</guid>
</item>
<item>
<title>Some Notes About the Xen XSA-122 Bug</title>
<link>https://research.nccgroup.com/2015/05/22/some-notes-about-the-xen-xsa-122-bug/</link>
<description>Some Notes About the Xen XSA-122 Bug</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/05/22/some-notes-about-the-xen-xsa-122-bug/</guid>
</item>
<item>
<title>Faux Disk Encryption: Realities of Secure Storage On Mobile Devices</title>
<link>https://research.nccgroup.com/2015/06/08/faux-disk-encryption-realities-of-secure-storage-on-mobile-devices/</link>
<description>Faux Disk Encryption: Realities of Secure Storage On Mobile Devices</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/06/08/faux-disk-encryption-realities-of-secure-storage-on-mobile-devices/</guid>
</item>
<item>
<title>IAM user management strategy (part 2)</title>
<link>https://research.nccgroup.com/2015/06/09/iam-user-management-strategy-part-2/</link>
<description>IAM user management strategy (part 2)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/06/09/iam-user-management-strategy-part-2/</guid>
</item>
<item>
<title>Username enumeration techniques and their value</title>
<link>https://research.nccgroup.com/2015/06/10/username-enumeration-techniques-and-their-value/</link>
<description>Username enumeration techniques and their value</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/06/10/username-enumeration-techniques-and-their-value/</guid>
</item>
<item>
<title>Blind Return Oriented Programming</title>
<link>https://research.nccgroup.com/2015/06/12/blind-return-oriented-programming/</link>
<description>Blind Return Oriented Programming</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/06/12/blind-return-oriented-programming/</guid>
</item>
<item>
<title>Cyber red-teaming business-critical systems while managing operational risk</title>
<link>https://research.nccgroup.com/2015/06/16/cyber-red-teaming-business-critical-systems-while-managing-operational-risk/</link>
<description>Cyber red-teaming business-critical systems while managing operational risk</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/06/16/cyber-red-teaming-business-critical-systems-while-managing-operational-risk/</guid>
</item>
<item>
<title>Blackbox iOS App Assessments Using idb</title>
<link>https://research.nccgroup.com/2015/06/16/blackbox-ios-app-assessments-using-idb/</link>
<description>Blackbox iOS App Assessments Using idb</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/06/16/blackbox-ios-app-assessments-using-idb/</guid>
</item>
<item>
<title>The why behind web application penetration test prerequisites</title>
<link>https://research.nccgroup.com/2015/06/18/the-why-behind-web-application-penetration-test-prerequisites/</link>
<description>The why behind web application penetration test prerequisites</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/06/18/the-why-behind-web-application-penetration-test-prerequisites/</guid>
</item>
<item>
<title>Research Insights Volume 5 – Sector Focus: Automotive</title>
<link>https://research.nccgroup.com/2015/06/23/research-insights-volume-5-automotive-cyber-security/</link>
<description>Research Insights Volume 5 – Sector Focus: Automotive</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/06/23/research-insights-volume-5-automotive-cyber-security/</guid>
</item>
<item>
<title>Exploiting Security Gateways Via Web Interfaces</title>
<link>https://research.nccgroup.com/2015/07/05/exploiting-security-gateways-via-web-interfaces/</link>
<description>Exploiting Security Gateways Via Web Interfaces</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/exploiting-security-gateways-via-web-interfaces/</guid>
</item>
<item>
<title>HDMI – Hacking Displays Made Interesting</title>
<link>https://research.nccgroup.com/2015/07/05/hdmi-hacking-displays-made-interesting/</link>
<description>HDMI – Hacking Displays Made Interesting</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/hdmi-hacking-displays-made-interesting/</guid>
</item>
<item>
<title>Fuzzing USB devices using Frisbee Lite</title>
<link>https://research.nccgroup.com/2015/07/05/fuzzing-usb-devices-using-frisbee-lite/</link>
<description>Fuzzing USB devices using Frisbee Lite</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/fuzzing-usb-devices-using-frisbee-lite/</guid>
</item>
<item>
<title>Hacking Appliances: Ironic exploits in security products</title>
<link>https://research.nccgroup.com/2015/07/05/hacking-appliances-ironic-exploits-in-security-products/</link>
<description>Hacking Appliances: Ironic exploits in security products</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/hacking-appliances-ironic-exploits-in-security-products/</guid>
</item>
<item>
<title>Hackproofing Lotus Domino Web Server</title>
<link>https://research.nccgroup.com/2015/07/05/hackproofing-lotus-domino-web-server/</link>
<description>Hackproofing Lotus Domino Web Server</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/hackproofing-lotus-domino-web-server/</guid>
</item>
<item>
<title>Hackproofing MySQL</title>
<link>https://research.nccgroup.com/2015/07/05/hackproofing-mysql/</link>
<description>Hackproofing MySQL</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/hackproofing-mysql/</guid>
</item>
<item>
<title>Hackproofing Oracle Application Server</title>
<link>https://research.nccgroup.com/2015/07/05/hackproofing-oracle-application-server/</link>
<description>Hackproofing Oracle Application Server</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/hackproofing-oracle-application-server/</guid>
</item>
<item>
<title>How organisations can properly configure SSL services to ensure the integrity and confidentiality of data in transit</title>
<link>https://research.nccgroup.com/2015/07/05/how-organisations-can-properly-configure-ssl-services-to-ensure-the-integrity-and-confidentiality-of-data-in-transit/</link>
<description>How organisations can properly configure SSL services to ensure the integrity and confidentiality of data in transit</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/how-organisations-can-properly-configure-ssl-services-to-ensure-the-integrity-and-confidentiality-of-data-in-transit/</guid>
</item>
<item>
<title>Implementing and Detecting a PCI Rootkit</title>
<link>https://research.nccgroup.com/2015/07/05/implementing-and-detecting-a-pci-rootkit/</link>
<description>Implementing and Detecting a PCI Rootkit</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/implementing-and-detecting-a-pci-rootkit/</guid>
</item>
<item>
<title>Improving your Network and Application Assurance Strategy in an environment of increasing 0day vulnerabilities</title>
<link>https://research.nccgroup.com/2015/07/05/improving-your-network-and-application-assurance-strategy-in-an-environment-of-increasing-0day-vulnerabilities/</link>
<description>Improving your Network and Application Assurance Strategy in an environment of increasing 0day vulnerabilities</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/improving-your-network-and-application-assurance-strategy-in-an-environment-of-increasing-0day-vulnerabilities/</guid>
</item>
<item>
<title>Inter-Protocol Communication</title>
<link>https://research.nccgroup.com/2015/07/05/inter-protocol-communication/</link>
<description>Inter-Protocol Communication</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/inter-protocol-communication/</guid>
</item>
<item>
<title>Inter-Protocol Exploitation</title>
<link>https://research.nccgroup.com/2015/07/05/inter-protocol-exploitation/</link>
<description>Inter-Protocol Exploitation</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/inter-protocol-exploitation/</guid>
</item>
<item>
<title>Lessons learned from 50 bugs: Common USB driver vulnerabilities</title>
<link>https://research.nccgroup.com/2015/07/05/lessons-learned-from-50-bugs-common-usb-driver-vulnerabilities/</link>
<description>Lessons learned from 50 bugs: Common USB driver vulnerabilities</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/lessons-learned-from-50-bugs-common-usb-driver-vulnerabilities/</guid>
</item>
<item>
<title>Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel</title>
<link>https://research.nccgroup.com/2015/07/05/low-cost-attacks-on-smart-cards-the-electromagnetic-side-channel/</link>
<description>Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/low-cost-attacks-on-smart-cards-the-electromagnetic-side-channel/</guid>
</item>
<item>
<title>Microsoft SQL Server Passwords</title>
<link>https://research.nccgroup.com/2015/07/05/microsoft-sql-server-passwords/</link>
<description>Microsoft SQL Server Passwords</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/microsoft-sql-server-passwords/</guid>
</item>
<item>
<title>Microsoft’s SQL Server vs. Oracle’s RDBMS</title>
<link>https://research.nccgroup.com/2015/07/05/microsofts-sql-server-vs-oracles-rdbms/</link>
<description>Microsoft’s SQL Server vs. Oracle’s RDBMS</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/microsofts-sql-server-vs-oracles-rdbms/</guid>
</item>
<item>
<title>More Advanced SQL Injection</title>
<link>https://research.nccgroup.com/2015/07/05/more-advanced-sql-injection/</link>
<description>More Advanced SQL Injection</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/more-advanced-sql-injection/</guid>
</item>
<item>
<title>New Attack Vectors and a Vulnerability Dissection of MS03-007</title>
<link>https://research.nccgroup.com/2015/07/05/new-attack-vectors-and-a-vulnerability-dissection-of-ms03-007/</link>
<description>New Attack Vectors and a Vulnerability Dissection of MS03-007</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/new-attack-vectors-and-a-vulnerability-dissection-of-ms03-007/</guid>
</item>
<item>
<title>Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP</title>
<link>https://research.nccgroup.com/2015/07/05/non-stack-based-exploitation-of-buffer-overrun-vulnerabilities-on-windows-nt-2000-xp/</link>
<description>Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/non-stack-based-exploitation-of-buffer-overrun-vulnerabilities-on-windows-nt-2000-xp/</guid>
</item>
<item>
<title>Oracle Forensics Part 1: Dissecting the Redo Logs</title>
<link>https://research.nccgroup.com/2015/07/05/oracle-forensics-part-1-dissecting-the-redo-logs/</link>
<description>Oracle Forensics Part 1: Dissecting the Redo Logs</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/oracle-forensics-part-1-dissecting-the-redo-logs/</guid>
</item>
<item>
<title>Oracle Forensics Part 2: Locating Dropped Objects</title>
<link>https://research.nccgroup.com/2015/07/05/oracle-forensics-part-2-locating-dropped-objects/</link>
<description>Oracle Forensics Part 2: Locating Dropped Objects</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/oracle-forensics-part-2-locating-dropped-objects/</guid>
</item>
<item>
<title>Oracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication Mechanism</title>
<link>https://research.nccgroup.com/2015/07/05/oracle-forensics-part-3-isolating-evidence-of-attacks-against-the-authentication-mechanism/</link>
<description>Oracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication Mechanism</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/oracle-forensics-part-3-isolating-evidence-of-attacks-against-the-authentication-mechanism/</guid>
</item>
<item>
<title>Oracle Forensics Part 4: Live Response</title>
<link>https://research.nccgroup.com/2015/07/05/oracle-forensics-part-4-live-response/</link>
<description>Oracle Forensics Part 4: Live Response</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/oracle-forensics-part-4-live-response/</guid>
</item>
<item>
<title>Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing</title>
<link>https://research.nccgroup.com/2015/07/05/oracle-forensics-part-5-finding-evidence-of-data-theft-in-the-absence-of-auditing/</link>
<description>Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/oracle-forensics-part-5-finding-evidence-of-data-theft-in-the-absence-of-auditing/</guid>
</item>
<item>
<title>Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin</title>
<link>https://research.nccgroup.com/2015/07/05/oracle-forensics-part-6-examining-undo-segments-flashback-and-the-oracle-recycle-bin/</link>
<description>Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/oracle-forensics-part-6-examining-undo-segments-flashback-and-the-oracle-recycle-bin/</guid>
</item>
<item>
<title>Oracle Forensics Part 7 Using the Oracle System Change Number in Forensic Investigations</title>
<link>https://research.nccgroup.com/2015/07/05/oracle-forensics-part-7-using-the-oracle-system-change-number-in-forensic-investigations/</link>
<description>Oracle Forensics Part 7 Using the Oracle System Change Number in Forensic Investigations</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/oracle-forensics-part-7-using-the-oracle-system-change-number-in-forensic-investigations/</guid>
</item>
<item>
<title>Oracle Passwords and OraBrute</title>
<link>https://research.nccgroup.com/2015/07/05/oracle-passwords-and-orabrute/</link>
<description>Oracle Passwords and OraBrute</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/oracle-passwords-and-orabrute/</guid>
</item>
<item>
<title>Passive Information Gathering – The Analysis of Leaked Network Security Information</title>
<link>https://research.nccgroup.com/2015/07/05/passive-information-gathering-the-analysis-of-leaked-network-security-information/</link>
<description>Passive Information Gathering – The Analysis of Leaked Network Security Information</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/passive-information-gathering-the-analysis-of-leaked-network-security-information/</guid>
</item>
<item>
<title>Preparing for Cyber Battleships – Electronic Chart Display and Information System Security</title>
<link>https://research.nccgroup.com/2015/07/05/preparing-for-cyber-battleships-electronic-chart-display-and-information-system-security/</link>
<description>Preparing for Cyber Battleships – Electronic Chart Display and Information System Security</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/preparing-for-cyber-battleships-electronic-chart-display-and-information-system-security/</guid>
</item>
<item>
<title>Protecting stored cardholder data (an unofficial supplement to PCI DSS V3.0)</title>
<link>https://research.nccgroup.com/2015/07/05/protecting-stored-cardholder-data-an-unofficial-supplement-to-pci-dss-v3-0/</link>
<description>Protecting stored cardholder data (an unofficial supplement to PCI DSS V3.0)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/protecting-stored-cardholder-data-an-unofficial-supplement-to-pci-dss-v3-0/</guid>
</item>
<item>
<title>Quantum Cryptography – A Study Into Present Technologies and Future Applications</title>
<link>https://research.nccgroup.com/2015/07/05/quantum-cryptography-a-study-into-present-technologies-and-future-applications/</link>
<description>Quantum Cryptography – A Study Into Present Technologies and Future Applications</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/quantum-cryptography-a-study-into-present-technologies-and-future-applications/</guid>
</item>
<item>
<title>Research Insights Volume 1 – Sector Focus: Financial Services</title>
<link>https://research.nccgroup.com/2015/07/05/research-insights-volume-1-sector-focus-financial-services/</link>
<description>Research Insights Volume 1 – Sector Focus: Financial Services</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/research-insights-volume-1-sector-focus-financial-services/</guid>
</item>
<item>
<title>Research Insights Volume 2 – Defensive Trends</title>
<link>https://research.nccgroup.com/2015/07/05/research-insights-volume-2-defensive-trends/</link>
<description>Research Insights Volume 2 – Defensive Trends</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/research-insights-volume-2-defensive-trends/</guid>
</item>
<item>
<title>Research Insights Volume 4 – Sector Focus: Maritime Sector</title>
<link>https://research.nccgroup.com/2015/07/05/research-insights-volume-4-sector-focus-maritime-sector/</link>
<description>Research Insights Volume 4 – Sector Focus: Maritime Sector</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/research-insights-volume-4-sector-focus-maritime-sector/</guid>
</item>
<item>
<title>Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions 2013</title>
<link>https://research.nccgroup.com/2015/07/05/revealing-embedded-fingerprints-deriving-intelligence-from-usb-stack-interactions-2013/</link>
<description>Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions 2013</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/revealing-embedded-fingerprints-deriving-intelligence-from-usb-stack-interactions-2013/</guid>
</item>
<item>
<title>Second-Order Code Injection Attacks</title>
<link>https://research.nccgroup.com/2015/07/05/second-order-code-injection-attacks/</link>
<description>Second-Order Code Injection Attacks</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/second-order-code-injection-attacks/</guid>
</item>
<item>
<title>Securing PL/SQL Applications with DBMS_ASSERT</title>
<link>https://research.nccgroup.com/2015/07/05/securing-plsql-applications-with-dbms_assert/</link>
<description>Securing PL/SQL Applications with DBMS_ASSERT</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/securing-plsql-applications-with-dbms_assert/</guid>
</item>
<item>
<title>Security Best Practice: Host Naming & URL Conventions</title>
<link>https://research.nccgroup.com/2015/07/05/security-best-practice-host-naming-url-conventions/</link>
<description>Security Best Practice: Host Naming & URL Conventions</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/security-best-practice-host-naming-url-conventions/</guid>
</item>
<item>
<title>Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond</title>
<link>https://research.nccgroup.com/2015/07/05/security-of-things-an-implementers-guide-to-cyber-security-for-internet-of-things-devices-and-beyond/</link>
<description>Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/security-of-things-an-implementers-guide-to-cyber-security-for-internet-of-things-devices-and-beyond/</guid>
</item>
<item>
<title>Stopping Automated Attack Tools</title>
<link>https://research.nccgroup.com/2015/07/05/stopping-automated-attack-tools/</link>
<description>Stopping Automated Attack Tools</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/stopping-automated-attack-tools/</guid>
</item>
<item>
<title>The Demise of Signature Based Antivirus</title>
<link>https://research.nccgroup.com/2015/07/05/the-demise-of-signature-based-antivirus/</link>
<description>The Demise of Signature Based Antivirus</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/05/the-demise-of-signature-based-antivirus/</guid>
</item>
<item>
<title>Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE-2015-0057) bug on both 32-bit and 64-bit</title>
<link>https://research.nccgroup.com/2015/07/08/exploiting-the-win32kxxxenablewndsbarrows-use-after-free-cve-2015-0057-bug-on-both-32-bit-and-64-bit/</link>
<description>Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE-2015-0057) bug on both 32-bit and 64-bit</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/08/exploiting-the-win32kxxxenablewndsbarrows-use-after-free-cve-2015-0057-bug-on-both-32-bit-and-64-bit/</guid>
</item>
<item>
<title>Research Insights Volume 7: Exploitation Advancements</title>
<link>https://research.nccgroup.com/2015/07/10/research-insights-volume-7-exploitation-advancements/</link>
<description>Research Insights Volume 7: Exploitation Advancements</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/10/research-insights-volume-7-exploitation-advancements/</guid>
</item>
<item>
<title>Modelling Threat Actor Phishing Behaviour</title>
<link>https://research.nccgroup.com/2015/07/22/modelling-threat-actor-phishing-behaviour/</link>
<description>Modelling Threat Actor Phishing Behaviour</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/22/modelling-threat-actor-phishing-behaviour/</guid>
</item>
<item>
<title>Broadcasting your attack – DAB security</title>
<link>https://research.nccgroup.com/2015/07/28/broadcasting-your-attack-dab-security/</link>
<description>Broadcasting your attack – DAB security</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/07/28/broadcasting-your-attack-dab-security/</guid>
</item>
<item>
<title>Tool Release: Introducing opinel: Scout2’s favorite tool</title>
<link>https://research.nccgroup.com/2015/08/03/tool-release-introducing-opinel-scout2s-favorite-tool/</link>
<description>Tool Release: Introducing opinel: Scout2’s favorite tool</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/03/tool-release-introducing-opinel-scout2s-favorite-tool/</guid>
</item>
<item>
<title>Adobe Acrobat Reader XML Forms Data Format Buffer Overflow</title>
<link>https://research.nccgroup.com/2015/08/05/adobe-acrobat-reader-xml-forms-data-format-buffer-overflow/</link>
<description>Adobe Acrobat Reader XML Forms Data Format Buffer Overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/adobe-acrobat-reader-xml-forms-data-format-buffer-overflow/</guid>
</item>
<item>
<title>Adobe Flash Player Cross Domain Policy Bypass</title>
<link>https://research.nccgroup.com/2015/08/05/adobe-flash-player-cross-domain-policy-bypass/</link>
<description>Adobe Flash Player Cross Domain Policy Bypass</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/adobe-flash-player-cross-domain-policy-bypass/</guid>
</item>
<item>
<title>Adobe flash sandbox bypass to navigate to local drives</title>
<link>https://research.nccgroup.com/2015/08/05/adobe-flash-sandbox-bypass-to-navigate-to-local-drives/</link>
<description>Adobe flash sandbox bypass to navigate to local drives</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/adobe-flash-sandbox-bypass-to-navigate-to-local-drives/</guid>
</item>
<item>
<title>The Pentesters Guide to Akamai</title>
<link>https://research.nccgroup.com/2015/08/05/the-pentesters-guide-to-akamai/</link>
<description>The Pentesters Guide to Akamai</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/the-pentesters-guide-to-akamai/</guid>
</item>
<item>
<title>Windows 2000 Format String Vulnerabilities</title>
<link>https://research.nccgroup.com/2015/08/05/windows-2000-format-string-vulnerabilities/</link>
<description>Windows 2000 Format String Vulnerabilities</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/windows-2000-format-string-vulnerabilities/</guid>
</item>
<item>
<title>Writing Secure ASP Scripts</title>
<link>https://research.nccgroup.com/2015/08/05/writing-secure-asp-scripts/</link>
<description>Writing Secure ASP Scripts</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/writing-secure-asp-scripts/</guid>
</item>
<item>
<title>Writing Small Shellcode</title>
<link>https://research.nccgroup.com/2015/08/05/writing-small-shellcode/</link>
<description>Writing Small Shellcode</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/writing-small-shellcode/</guid>
</item>
<item>
<title>Apple CoreAnimation Heap Overflow</title>
<link>https://research.nccgroup.com/2015/08/05/apple-coreanimation-heap-overflow/</link>
<description>Apple CoreAnimation Heap Overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/apple-coreanimation-heap-overflow/</guid>
</item>
<item>
<title>Apple Mac OS X ImageIO TIFF Integer Overflow</title>
<link>https://research.nccgroup.com/2015/08/05/apple-mac-os-x-imageio-tiff-integer-overflow/</link>
<description>Apple Mac OS X ImageIO TIFF Integer Overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/apple-mac-os-x-imageio-tiff-integer-overflow/</guid>
</item>
<item>
<title>Apple OSX/iPhone iOS ImageIO TIFF getBandProcTIFF TileWidth Heap Overflow</title>
<link>https://research.nccgroup.com/2015/08/05/apple-osxiphone-ios-imageio-tiff-getbandproctiff-tilewidth-heap-overflow/</link>
<description>Apple OSX/iPhone iOS ImageIO TIFF getBandProcTIFF TileWidth Heap Overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/apple-osxiphone-ios-imageio-tiff-getbandproctiff-tilewidth-heap-overflow/</guid>
</item>
<item>
<title>Apple QuickTime Player m4a Processing Buffer Overflow</title>
<link>https://research.nccgroup.com/2015/08/05/apple-quicktime-player-m4a-processing-buffer-overflow/</link>
<description>Apple QuickTime Player m4a Processing Buffer Overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/apple-quicktime-player-m4a-processing-buffer-overflow/</guid>
</item>
<item>
<title>Archived Technical Advisories</title>
<link>https://research.nccgroup.com/2015/08/05/archived-technical-advisories/</link>
<description>Archived Technical Advisories</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/archived-technical-advisories/</guid>
</item>
<item>
<title>ASE 12.5.1 datatype overflow</title>
<link>https://research.nccgroup.com/2015/08/05/ase-12-5-1-datatype-overflow/</link>
<description>ASE 12.5.1 datatype overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/ase-12-5-1-datatype-overflow/</guid>
</item>
<item>
<title>AtHoc Toolbar</title>
<link>https://research.nccgroup.com/2015/08/05/athoc-toolbar/</link>
<description>AtHoc Toolbar</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/athoc-toolbar/</guid>
</item>
<item>
<title>Back Office Web Administration Authentication Bypass</title>
<link>https://research.nccgroup.com/2015/08/05/back-office-web-administration-authentication-bypass/</link>
<description>Back Office Web Administration Authentication Bypass</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/back-office-web-administration-authentication-bypass/</guid>
</item>
<item>
<title>Bit51 Better Security WP Security Plugin – Unauthenticated Stored XSS to RCE</title>
<link>https://research.nccgroup.com/2015/08/05/bit51-better-security-wp-security-plugin-unauthenticated-stored-xss-to-rce/</link>
<description>Bit51 Better Security WP Security Plugin – Unauthenticated Stored XSS to RCE</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/bit51-better-security-wp-security-plugin-unauthenticated-stored-xss-to-rce/</guid>
</item>
<item>
<title>BlackBerry Link WebDav Server Bound to the BlackBerry VPN Adapter</title>
<link>https://research.nccgroup.com/2015/08/05/blackberry-link-webdav-server-bound-to-the-blackberry-vpn-adapter/</link>
<description>BlackBerry Link WebDav Server Bound to the BlackBerry VPN Adapter</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/blackberry-link-webdav-server-bound-to-the-blackberry-vpn-adapter/</guid>
</item>
<item>
<title>Blue Coat BCAAA Remote Code Execution Vulnerability</title>
<link>https://research.nccgroup.com/2015/08/05/blue-coat-bcaaa-remote-code-execution-vulnerability/</link>
<description>Blue Coat BCAAA Remote Code Execution Vulnerability</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/blue-coat-bcaaa-remote-code-execution-vulnerability/</guid>
</item>
<item>
<title>Cisco IPSec VPN Implementation Group Name Enumeration</title>
<link>https://research.nccgroup.com/2015/08/05/cisco-ipsec-vpn-implementation-group-name-enumeration/</link>
<description>Cisco IPSec VPN Implementation Group Name Enumeration</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/cisco-ipsec-vpn-implementation-group-name-enumeration/</guid>
</item>
<item>
<title>Cisco VPN Client Privilege Escalation</title>
<link>https://research.nccgroup.com/2015/08/05/cisco-vpn-client-privilege-escalation/</link>
<description>Cisco VPN Client Privilege Escalation</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/cisco-vpn-client-privilege-escalation/</guid>
</item>
<item>
<title>Critical Risk Vulnerability in Ingres (Pointer Overwrite 1)</title>
<link>https://research.nccgroup.com/2015/08/05/critical-risk-vulnerability-in-ingres-pointer-overwrite-1/</link>
<description>Critical Risk Vulnerability in Ingres (Pointer Overwrite 1)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/critical-risk-vulnerability-in-ingres-pointer-overwrite-1/</guid>
</item>
<item>
<title>Critical Risk Vulnerability in Ingres (Pointer Overwrite 2)</title>
<link>https://research.nccgroup.com/2015/08/05/critical-risk-vulnerability-in-ingres-pointer-overwrite-2/</link>
<description>Critical Risk Vulnerability in Ingres (Pointer Overwrite 2)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/critical-risk-vulnerability-in-ingres-pointer-overwrite-2/</guid>
</item>
<item>
<title>Critical Risk Vulnerability in SAP DB Web Server (Stack Overflow)</title>
<link>https://research.nccgroup.com/2015/08/05/critical-risk-vulnerability-in-sap-db-web-server-stack-overflow/</link>
<description>Critical Risk Vulnerability in SAP DB Web Server (Stack Overflow)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/critical-risk-vulnerability-in-sap-db-web-server-stack-overflow/</guid>
</item>
<item>
<title>Critical Risk Vulnerability in SAP Message Server (Heap Overflow)</title>
<link>https://research.nccgroup.com/2015/08/05/critical-risk-vulnerability-in-sap-message-server-heap-overflow/</link>
<description>Critical Risk Vulnerability in SAP Message Server (Heap Overflow)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/critical-risk-vulnerability-in-sap-message-server-heap-overflow/</guid>
</item>
<item>
<title>Cups-filters remote code execution</title>
<link>https://research.nccgroup.com/2015/08/05/cups-filters-remote-code-execution/</link>
<description>Cups-filters remote code execution</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/cups-filters-remote-code-execution/</guid>
</item>
<item>
<title>DataArmor Full Disk Encryption 3.0.12c – Restricted Environment breakout, Privilege Escalation and Full Disk Decryption</title>
<link>https://research.nccgroup.com/2015/08/05/dataarmor-full-disk-encryption-3-0-12c-restricted-environment-breakout-privilege-escalation-and-full-disk-decryption/</link>
<description>DataArmor Full Disk Encryption 3.0.12c – Restricted Environment breakout, Privilege Escalation and Full Disk Decryption</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/dataarmor-full-disk-encryption-3-0-12c-restricted-environment-breakout-privilege-escalation-and-full-disk-decryption/</guid>
</item>
<item>
<title>Immunity Debugger Buffer Overflow</title>
<link>https://research.nccgroup.com/2015/08/05/immunity-debugger-buffer-overflow/</link>
<description>Immunity Debugger Buffer Overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/immunity-debugger-buffer-overflow/</guid>
</item>
<item>
<title>Flash security restrictions bypass: File upload by URLRequest</title>
<link>https://research.nccgroup.com/2015/08/05/flash-security-restrictions-bypass-file-upload-by-urlrequest/</link>
<description>Flash security restrictions bypass: File upload by URLRequest</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/flash-security-restrictions-bypass-file-upload-by-urlrequest/</guid>
</item>
<item>
<title>Increased exploitation of Oracle GlassFish Server Administration Console Remote Authentication Bypass</title>
<link>https://research.nccgroup.com/2015/08/05/increased-exploitation-of-oracle-glassfish-server-administration-console-remote-authentication-bypass/</link>
<description>Increased exploitation of Oracle GlassFish Server Administration Console Remote Authentication Bypass</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/increased-exploitation-of-oracle-glassfish-server-administration-console-remote-authentication-bypass/</guid>
</item>
<item>
<title>LibAVCodec AMV Out of Array Write</title>
<link>https://research.nccgroup.com/2015/08/05/libavcodec-amv-out-of-array-write/</link>
<description>LibAVCodec AMV Out of Array Write</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/libavcodec-amv-out-of-array-write/</guid>
</item>
<item>
<title>Lumension Device Control (formerly Sanctuary) remote memory corruption</title>
<link>https://research.nccgroup.com/2015/08/05/lumension-device-control-formerly-sanctuary-remote-memory-corruption/</link>
<description>Lumension Device Control (formerly Sanctuary) remote memory corruption</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/05/lumension-device-control-formerly-sanctuary-remote-memory-corruption/</guid>
</item>
<item>
<title>libtalloc: A GDB plugin for analysing the talloc heap</title>
<link>https://research.nccgroup.com/2015/08/11/libtalloc-a-gdb-plugin-for-analysing-the-talloc-heap/</link>
<description>libtalloc: A GDB plugin for analysing the talloc heap</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/11/libtalloc-a-gdb-plugin-for-analysing-the-talloc-heap/</guid>
</item>
<item>
<title>Understanding Ransomware: Impact, Evolution and Defensive Strategies</title>
<link>https://research.nccgroup.com/2015/08/18/understanding-ransomware-impact-evolution-and-defensive-strategies/</link>
<description>Understanding Ransomware: Impact, Evolution and Defensive Strategies</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/18/understanding-ransomware-impact-evolution-and-defensive-strategies/</guid>
</item>
<item>
<title>Password and brute-force mitigation policies</title>
<link>https://research.nccgroup.com/2015/08/25/password-and-brute-force-mitigation-policies/</link>
<description>Password and brute-force mitigation policies</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/25/password-and-brute-force-mitigation-policies/</guid>
</item>
<item>
<title>Exploiting MS15-061 Use-After-Free Windows Kernel Vulnerability</title>
<link>https://research.nccgroup.com/2015/08/27/exploiting-ms15-061-use-after-free-windows-kernel-vulnerability/</link>
<description>Exploiting MS15-061 Use-After-Free Windows Kernel Vulnerability</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/08/27/exploiting-ms15-061-use-after-free-windows-kernel-vulnerability/</guid>
</item>
<item>
<title>Exploiting CVE-2015-2426, and How I Ported it to a Recent Windows 8.1 64-bit</title>
<link>https://research.nccgroup.com/2015/09/01/exploiting-cve-2015-2426-and-how-i-ported-it-to-a-recent-windows-8-1-64-bit/</link>
<description>Exploiting CVE-2015-2426, and How I Ported it to a Recent Windows 8.1 64-bit</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/09/01/exploiting-cve-2015-2426-and-how-i-ported-it-to-a-recent-windows-8-1-64-bit/</guid>
</item>
<item>
<title>Build Your Own Wi-Fi Mapping Drone Capability</title>
<link>https://research.nccgroup.com/2015/09/21/build-your-own-wi-fi-mapping-drone-capability/</link>
<description>Build Your Own Wi-Fi Mapping Drone Capability</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/09/21/build-your-own-wi-fi-mapping-drone-capability/</guid>
</item>
<item>
<title>Research Insights Volume 3 – How are we breaking in: Mobile Security</title>
<link>https://research.nccgroup.com/2015/10/04/research-insights-volume-3-how-are-we-breaking-in-mobile-security/</link>
<description>Research Insights Volume 3 – How are we breaking in: Mobile Security</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/10/04/research-insights-volume-3-how-are-we-breaking-in-mobile-security/</guid>
</item>
<item>
<title>Common Security Issues in Financially-Oriented Web Applications</title>
<link>https://research.nccgroup.com/2015/10/06/common-security-issues-in-financially-orientated-web-applications/</link>
<description>Common Security Issues in Financially-Oriented Web Applications</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/10/06/common-security-issues-in-financially-orientated-web-applications/</guid>
</item>
<item>
<title>Does TypeScript Offer Security Improvements Over JavaScript?</title>
<link>https://research.nccgroup.com/2015/10/06/does-typescript-offer-security-improvements-over-javascript/</link>
<description>Does TypeScript Offer Security Improvements Over JavaScript?</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/10/06/does-typescript-offer-security-improvements-over-javascript/</guid>
</item>
<item>
<title>Research Insights Volume 6: Common Issues with Environment Breakouts</title>
<link>https://research.nccgroup.com/2015/10/08/research-insights-volume-6-environment-breakout/</link>
<description>Research Insights Volume 6: Common Issues with Environment Breakouts</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/10/08/research-insights-volume-6-environment-breakout/</guid>
</item>
<item>
<title>Vehicle Emissions and Cyber Security</title>
<link>https://research.nccgroup.com/2015/10/14/vehicle-emissions-and-cyber-security/</link>
<description>Vehicle Emissions and Cyber Security</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/10/14/vehicle-emissions-and-cyber-security/</guid>
</item>
<item>
<title>Porting the Misfortune Cookie Exploit: A Look into Router Exploitation Using the TD-8817</title>
<link>https://research.nccgroup.com/2015/10/16/porting-the-misfortune-cookie-exploit-a-look-into-router-exploitation-using-the-td-8817/</link>
<description>Porting the Misfortune Cookie Exploit: A Look into Router Exploitation Using the TD-8817</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/10/16/porting-the-misfortune-cookie-exploit-a-look-into-router-exploitation-using-the-td-8817/</guid>
</item>
<item>
<title>Understanding Microsoft Word OLE Exploit Primitives: Exploiting CVE-2015-1642 Microsoft Office CTaskSymbol Use-After-Free Vulnerability</title>
<link>https://research.nccgroup.com/2015/10/30/understanding-microsoft-word-ole-exploit-primitives/</link>
<description>Understanding Microsoft Word OLE Exploit Primitives: Exploiting CVE-2015-1642 Microsoft Office CTaskSymbol Use-After-Free Vulnerability</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/10/30/understanding-microsoft-word-ole-exploit-primitives/</guid>
</item>
<item>
<title>Understanding Microsoft Word OLE Exploit Primitives</title>
<link>https://research.nccgroup.com/2015/10/30/understanding-microsoft-word-ole-exploit-primitives-2/</link>
<description>Understanding Microsoft Word OLE Exploit Primitives</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/10/30/understanding-microsoft-word-ole-exploit-primitives-2/</guid>
</item>
<item>
<title>iOS 7 arbitrary code execution in kernel mode</title>
<link>https://research.nccgroup.com/2015/11/05/ios-7-arbitrary-code-execution-in-kernel-mode/</link>
<description>iOS 7 arbitrary code execution in kernel mode</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/ios-7-arbitrary-code-execution-in-kernel-mode/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance v5.6 – Active session tokens of other users are disclosed within the UI</title>
<link>https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-active-session-tokens-of-other-users-are-disclosed-within-the-ui/</link>
<description>McAfee Email and Web Security Appliance v5.6 – Active session tokens of other users are disclosed within the UI</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-active-session-tokens-of-other-users-are-disclosed-within-the-ui/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance v5.6 – Any logged-in user can bypass controls to reset passwords of other administrators</title>
<link>https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-any-logged-in-user-can-bypass-controls-to-reset-passwords-of-other-administrators/</link>
<description>McAfee Email and Web Security Appliance v5.6 – Any logged-in user can bypass controls to reset passwords of other administrators</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-any-logged-in-user-can-bypass-controls-to-reset-passwords-of-other-administrators/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance v5.6 – Arbitrary file download is possible with a crafted URL, when logged in as any user</title>
<link>https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-arbitrary-file-download-is-possible-with-a-crafted-url-when-logged-in-as-any-user/</link>
<description>McAfee Email and Web Security Appliance v5.6 – Arbitrary file download is possible with a crafted URL, when logged in as any user</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-arbitrary-file-download-is-possible-with-a-crafted-url-when-logged-in-as-any-user/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance v5.6 – Password hashes can be recovered from a system backup and easily cracked</title>
<link>https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-password-hashes-can-be-recovered-from-a-system-backup-and-easily-cracked/</link>
<description>McAfee Email and Web Security Appliance v5.6 – Password hashes can be recovered from a system backup and easily cracked</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-password-hashes-can-be-recovered-from-a-system-backup-and-easily-cracked/</guid>
</item>
<item>
<title>McAfee Email and Web Security Appliance v5.6 – Session hijacking (and bypassing client-side session timeouts)</title>
<link>https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-session-hijacking-and-bypassing-client-side-session-timeouts/</link>
<description>McAfee Email and Web Security Appliance v5.6 – Session hijacking (and bypassing client-side session timeouts)</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/mcafee-email-and-web-security-appliance-v5-6-session-hijacking-and-bypassing-client-side-session-timeouts/</guid>
</item>
<item>
<title>Microsoft Internet Explorer CMarkup Use-After-Free</title>
<link>https://research.nccgroup.com/2015/11/05/microsoft-internet-explorer-cmarkup-use-after-free/</link>
<description>Microsoft Internet Explorer CMarkup Use-After-Free</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/microsoft-internet-explorer-cmarkup-use-after-free/</guid>
</item>
<item>
<title>Multiple Vulnerabilities in MailEnable</title>
<link>https://research.nccgroup.com/2015/11/05/multiple-vulnerabilities-in-mailenable/</link>
<description>Multiple Vulnerabilities in MailEnable</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/multiple-vulnerabilities-in-mailenable/</guid>
</item>
<item>
<title>Nagios XI Network Monitor – Stored and Reflective XSS</title>
<link>https://research.nccgroup.com/2015/11/05/nagios-xi-network-monitor-stored-and-reflective-xss/</link>
<description>Nagios XI Network Monitor – Stored and Reflective XSS</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/nagios-xi-network-monitor-stored-and-reflective-xss/</guid>
</item>
<item>
<title>NCC Group Malware Technical Note</title>
<link>https://research.nccgroup.com/2015/11/05/ncc-group-malware-technical-note/</link>
<description>NCC Group Malware Technical Note</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/ncc-group-malware-technical-note/</guid>
</item>
<item>
<title>Nessus Authenticated Scan – Local Privilege Escalation</title>
<link>https://research.nccgroup.com/2015/11/05/nessus-authenticated-scan-local-privilege-escalation/</link>
<description>Nessus Authenticated Scan – Local Privilege Escalation</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/nessus-authenticated-scan-local-privilege-escalation/</guid>
</item>
<item>
<title>Oracle E-Business Suite Pre-Auth SQLi with DBA Privileges</title>
<link>https://research.nccgroup.com/2015/11/05/oracle-e-business-suite-pre-auth-sqli-with-dba-privileges/</link>
<description>Oracle E-Business Suite Pre-Auth SQLi with DBA Privileges</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/oracle-e-business-suite-pre-auth-sqli-with-dba-privileges/</guid>
</item>
<item>
<title>Oracle Hyperion 11 Directory Traversal</title>
<link>https://research.nccgroup.com/2015/11/05/oracle-hyperion-11-directory-traversal/</link>
<description>Oracle Hyperion 11 Directory Traversal</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/oracle-hyperion-11-directory-traversal/</guid>
</item>
<item>
<title>Oracle Java Installer Adds a System Path Which is Writable by All</title>
<link>https://research.nccgroup.com/2015/11/05/oracle-java-installer-adds-a-system-path-which-is-writable-by-all/</link>
<description>Oracle Java Installer Adds a System Path Which is Writable by All</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/oracle-java-installer-adds-a-system-path-which-is-writable-by-all/</guid>
</item>
<item>
<title>OS X 10.6.6 Camera Raw Library Memory Corruption</title>
<link>https://research.nccgroup.com/2015/11/05/os-x-10-6-6-camera-raw-library-memory-corruption/</link>
<description>OS X 10.6.6 Camera Raw Library Memory Corruption</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/os-x-10-6-6-camera-raw-library-memory-corruption/</guid>
</item>
<item>
<title>Remote code execution in ImpressPages CMS</title>
<link>https://research.nccgroup.com/2015/11/05/remote-code-execution-in-impresspages-cms/</link>
<description>Remote code execution in ImpressPages CMS</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/remote-code-execution-in-impresspages-cms/</guid>
</item>
<item>
<title>SmarterMail – Stored XSS in emails</title>
<link>https://research.nccgroup.com/2015/11/05/smartermail-stored-xss-in-emails/</link>
<description>SmarterMail – Stored XSS in emails</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/smartermail-stored-xss-in-emails/</guid>
</item>
<item>
<title>Solaris 11 USB Hub Class descriptor kernel stack overflow</title>
<link>https://research.nccgroup.com/2015/11/05/solaris-11-usb-hub-class-descriptor-kernel-stack-overflow/</link>
<description>Solaris 11 USB Hub Class descriptor kernel stack overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/solaris-11-usb-hub-class-descriptor-kernel-stack-overflow/</guid>
</item>
<item>
<title>Squiz CMS File Path Traversal</title>
<link>https://research.nccgroup.com/2015/11/05/squiz-cms-file-path-traversal/</link>
<description>Squiz CMS File Path Traversal</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/squiz-cms-file-path-traversal/</guid>
</item>
<item>
<title>Symantec Backup Exec 2012 – Backup Exec Utility Stored XSS when adding Groups, Servers and Computers</title>
<link>https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-backup-exec-utility-stored-xss-when-adding-groups-servers-and-computers/</link>
<description>Symantec Backup Exec 2012 – Backup Exec Utility Stored XSS when adding Groups, Servers and Computers</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-backup-exec-utility-stored-xss-when-adding-groups-servers-and-computers/</guid>
</item>
<item>
<title>Symantec Backup Exec 2012 Backup/Restore Data Traverses Memory with Weak ACLs</title>
<link>https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-backuprestore-data-traverses-memory-with-weak-acls/</link>
<description>Symantec Backup Exec 2012 Backup/Restore Data Traverses Memory with Weak ACLs</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-backuprestore-data-traverses-memory-with-weak-acls/</guid>
</item>
<item>
<title>Symantec Backup Exec 2012 – Linux Backup Agent Heap Overflow</title>
<link>https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-linux-backup-agent-heap-overflow/</link>
<description>Symantec Backup Exec 2012 – Linux Backup Agent Heap Overflow</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-linux-backup-agent-heap-overflow/</guid>
</item>
<item>
<title>Symantec Backup Exec 2012 – OS version and service pack information leak</title>
<link>https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-os-version-and-service-pack-information-leak/</link>
<description>Symantec Backup Exec 2012 – OS version and service pack information leak</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-os-version-and-service-pack-information-leak/</guid>
</item>
<item>
<title>Symantec Backup Exec 2012 – Persistent XSS Vulnerability Affecting Custom Reports</title>
<link>https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-persistent-xss-vulnerability-affecting-custom-reports/</link>
<description>Symantec Backup Exec 2012 – Persistent XSS Vulnerability Affecting Custom Reports</description>
<guid isPermaLink="false">https://research.nccgroup.com/2015/11/05/symantec-backup-exec-2012-persistent-xss-vulnerability-affecting-custom-reports/</guid>
</item>
<item>