[SECURITY] >> [local] – WinRAR Filename Spoofing USER: deepcore // DATE: 2014-04-08 00:00 // MODIFIED: 2014-04-08 WinRAR Filename Spoofing TAGS: #0day#remote exploit < PREV_POST [remote] – Fritz!Box Webcm Unauthenticated Command Injection NEXT_POST > [web applications] – Halon Security Router (SR) =< v3.2-winter-r1 Multiple Vulnerabilities