https://www.theregister.co.uk/2018/04/04/microsoft_windows_defender_rar_bug/
A remote-code execution vulnerability in Windows Defender – a flaw that can be exploited by malicious .rar files to run malware on PCs – has been traced back to an open-source archiving tool Microsoft adopted for its own use.
[...] Apparently, Microsoft forked that version of unrar and incorporated the component into its operating system's antivirus engine. That forked code was then modified so that all signed integer variables were converted to unsigned variables, causing knock-on problems with mathematical comparisons. This in turn left the software vulnerable to memory corruption errors, which can crash the antivirus package or allow malicious code to potentially execute.
(Score: 0) by Anonymous Coward on Tuesday April 10 2018, @07:42PM
Feel free to feed the search string into the search engine of your choice.
(Most folks will get the point by just hovering over the link.)
...and the S/N comments engine strips out things like %22 from links.
Google's Verbatim Search end-runs that for phrases.
Nobody else has that.
When some other johnny-come-lately search engine has anything approximating what 20 year old Google has for syntax, I'll consider them a serious contender.
...and people who worry about privacy are already using a proxy|TOR.
archive.is is a quickie equivalent.
...and, instead of whining like a little bitch, you could have offered alternative links.
...again, for those who didn't get the point by simply hovering over the link.
-- OriginalOwner_ [soylentnews.org]