science and technology Clam AntiVirus Toolkit 0.102.0 By packetstormsecurity.com Published On :: Wed, 02 Oct 2019 20:32:34 GMT Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. Full Article
science and technology Clam AntiVirus Toolkit 0.102.1 By packetstormsecurity.com Published On :: Thu, 21 Nov 2019 02:35:22 GMT Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. Full Article
science and technology Max Secure Anti Virus Plus 19.0.4.020 Insecure Permissions By packetstormsecurity.com Published On :: Sat, 30 Nov 2019 22:42:30 GMT Max Secure Anti Virus Plus version 19.0.4.020 suffers from an insecure permission vulnerability. Full Article
science and technology AVIRA Generic Antivirus Bypass By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:02:23 GMT AVIRA engine versions below 8.3.54.138 suffer from a generic bypass vulnerability. The parsing engine supports the ISO container format. The parsing engine can be bypassed by specifically manipulating an ISO container so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
science and technology Kaspersky Generic Archive Bypass By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:06:10 GMT Various Kaspersky products suffer from a malformed archive bypass vulnerability. The parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
science and technology ESET Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:07:07 GMT Various ESET products suffer from a malformed archive bypass vulnerability. The parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
science and technology Kaspersky Generic Archive Bypass By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 21:14:19 GMT The parsing engine in various Kaspersky products supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (Compression Size Flag) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
science and technology Bitdefender Malformed Archive Bypass By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 21:21:14 GMT The parsing engine for various Bitdefender products supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (HOST_OS) so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
science and technology Kaspersky Generic Archive Bypass By packetstormsecurity.com Published On :: Mon, 13 Jan 2020 18:06:15 GMT The Kaspersky parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (File Name Length Field) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. A vast array of Kaspersky products are affected. Full Article
science and technology Bitdefender Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:58:50 GMT The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (Compressed Size) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected. Full Article
science and technology Bitdefender Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 16:00:02 GMT The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (RAR Compression Information) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected. Full Article
science and technology Clam AntiVirus Toolkit 0.102.2 By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 19:04:01 GMT Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. Full Article
science and technology ESET Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:29:59 GMT The ESET parsing engine can be bypassed by specifically manipulating a ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
science and technology Kaspersky Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 04:44:44 GMT The Kaspersky parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (File Name length Field) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
science and technology Bitdefender Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 11:01:11 GMT The Bitdefender parsing engine supports the GZIP archive format. The parsing engine can be bypassed by specifically manipulating a GZIP Archive (Compression Method) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
science and technology AVAST Generic Archive Bypass By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 05:02:22 GMT The AVAST parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating a ZIP archive so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
science and technology QuickHeal Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:04:41 GMT The QuickHeal parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (GPFLAG) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
science and technology Imperial College COVID-19 Response Team Report By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 17:09:42 GMT The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks. Full Article
science and technology iFileExplorer Free Directory Traversal By packetstormsecurity.com Published On :: Sat, 05 Mar 2011 01:11:28 GMT iFileExplorer Free for iPod Touch / iPhone version 2.8 suffers from a remote directory traversal vulnerability. Full Article
science and technology Apple iPhone 4 Passphrase Disclosure By packetstormsecurity.com Published On :: Mon, 07 Mar 2011 15:58:33 GMT Apple iPhone 4 with iOS 4.3 (8F190) suffers from a passphrase disclosure vulnerability that allows all local processes access to it. Full Article
science and technology Air Contacts Lite Denial Of Service By packetstormsecurity.com Published On :: Thu, 10 Mar 2011 22:42:22 GMT The Air Contacts Lite iPhone / iPod application suffers from a denial of service vulnerability. Full Article
science and technology Checkview 1.1 For iPhone / iPod Touch Directory Traversal By packetstormsecurity.com Published On :: Tue, 15 Mar 2011 01:28:26 GMT Checkview version 1.1 for iPhone / iPod Touch suffers from a directory traversal vulnerability. Full Article
science and technology Zero Day Initiative Advisory 11-109 By packetstormsecurity.com Published On :: Tue, 22 Mar 2011 20:31:31 GMT Zero Day Initiative Advisory 11-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on the iPhone. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the support for parsing Office files. When handling the OfficeArtMetafileHeader the process trusts the cbSize field and performs arithmetic on it before making an allocation. As the result is not checked for overflow, the subsequent allocation can be undersized. Later when copying into this buffer, memory can be corrupted leading to arbitrary code execution under the context of the mobile user on the iPhone. Full Article
science and technology Secunia Security Advisory 43832 By packetstormsecurity.com Published On :: Thu, 24 Mar 2011 08:52:53 GMT Secunia Security Advisory - A vulnerability has been reported in Apple iPhone iOS, which can be exploited by malicious people to compromise a vulnerable device. Full Article
science and technology Secunia Security Advisory 44154 By packetstormsecurity.com Published On :: Sun, 17 Apr 2011 06:25:13 GMT Secunia Security Advisory - Some vulnerabilities has been reported in Apple iOS for iPhone 4 (CDMA), which can be exploited by malicious people to compromise a vulnerable device. Full Article
science and technology iPhone/iPad Phone Drive 1.1.1 Directory Traversal By packetstormsecurity.com Published On :: Tue, 09 Aug 2011 16:54:28 GMT iPhone/iPad Phone Drive version 1.1.1 suffers from a directory traversal vulnerability. Full Article
science and technology Hacking iOS Devices By packetstormsecurity.com Published On :: Wed, 07 Dec 2011 16:09:44 GMT Whitepaper called Hacking Dispositivos iOS. It demonstrates how dangerous it is to be connected to a wireless network with an iOS device that has OpenSSH enabled. Written in Spanish. Full Article
science and technology iPhone Forensics On iOS 5 By packetstormsecurity.com Published On :: Fri, 20 Jan 2012 13:22:22 GMT This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone. Full Article
science and technology Vopium Clear Text Disclosure By packetstormsecurity.com Published On :: Sat, 21 Jan 2012 05:18:29 GMT Vopium for Android and iPhone leaks various data such as your password by passing it in the clear. Full Article
science and technology IPhone TreasonSMS HTML Injection / File Inclusion By packetstormsecurity.com Published On :: Mon, 23 Apr 2012 18:55:33 GMT IPhone TreasonSMS suffers from html injection and file inclusion vulnerabilities. Full Article
science and technology iOS Application (In)Security By packetstormsecurity.com Published On :: Sun, 06 May 2012 01:48:08 GMT This whitepaper details some of the vulnerabilities observed over the past year while performing regular security assessments of iPhone and iPad applications. MDSec documents some of the vulnerabilities identified as well as the methods to exploit them, and recommendations that developers can adopt to protect their iOS applications. It covers not only the security features of the platform, but provides in depth information on how to perform both black box and white box iOS penetration tests, along with suggested methodologies and compliance. Full Article
science and technology Forensic Analysis Of iPhone Backups By packetstormsecurity.com Published On :: Thu, 12 Jul 2012 11:11:11 GMT This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups. Full Article
science and technology Twitter 5.0 Eavesdropping Proof Of Concept By packetstormsecurity.com Published On :: Thu, 22 Nov 2012 18:22:22 GMT The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included. Full Article
science and technology Air Disk Wireless 1.9 LFI / Command Injection By packetstormsecurity.com Published On :: Fri, 08 Feb 2013 03:40:19 GMT Air Disk Wireless version 1.9 for iPad and iPhone suffers from local file inclusion and command injection vulnerabilities. Full Article
science and technology Transferable Remote 1.1 XSS / LFI / Command Injection By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 03:00:01 GMT Transferable Remote version 1.1 for iPad and iPhone suffers from cross site scripting, remote command injection, and local file inclusion vulnerabilities. Full Article
science and technology Packet Storm Exploit 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:37:10 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8. Earlier versions may also be affected. It was obtained through the Packet Storm Bug Bounty program. Full Article
science and technology Packet Storm Advisory 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:55:53 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. This method accepts the user-defined JavaScript function and calls it from the native code to compare array items. If this compare function reduces array length, then the trailing array items will be written outside the "m_storage->m_vector[]" buffer, which leads to the heap memory corruption. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
science and technology Air Transfer Iphone 1.3.9 Arbitrary File Download By packetstormsecurity.com Published On :: Mon, 25 Aug 2014 09:33:33 GMT Air Transfer Iphone version 1.3.9 suffers from remote denial of service and unauthenticated file access vulnerabilities. Full Article
science and technology WordPress Windows Desktop And iPhone Photo Uploader File Upload By packetstormsecurity.com Published On :: Thu, 09 Apr 2015 03:33:33 GMT WordPress Windows Desktop and iPhone Photo Uploader plugin suffers from a remote shell upload vulnerability. Full Article
science and technology Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article
science and technology Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:44:33 GMT Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing. Full Article
science and technology iPhone iMessage Malformed Message Bricking By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:34:02 GMT An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString. Full Article
science and technology iOS Messaging Tools By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 23:44:28 GMT This repository contains several tools Project Zero uses to test iPhone messaging. It includes SmsSimulator: an SMS simulator for iPhone, iMessage: tools for sending and dumping iMessage messages, and imapiness: a fuzzer for IMAP clients. See the directory for each tool for further instructions and contact information. This is not an officially supported Google product. These tools were released and presented at BlackHat USA 2019. Full Article
science and technology Hackers Wipe US Servers Of Email Provider VFEmail By packetstormsecurity.com Published On :: Tue, 12 Feb 2019 17:37:49 GMT Full Article headline hacker privacy email data loss
science and technology Microsoft Patches 0-Day Vulnerabilities In IE And Exchange By packetstormsecurity.com Published On :: Wed, 13 Feb 2019 15:01:51 GMT Full Article headline microsoft email flaw patch
science and technology Video: Wikileaks Rears Its Head In Cohen Testimony Against Trump By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 03:03:48 GMT Full Article headline government email usa britain russia data loss fraud
science and technology 809 Million Records Exposed By Email Marketing Giant By packetstormsecurity.com Published On :: Fri, 08 Mar 2019 15:35:18 GMT Full Article headline privacy email data loss
science and technology Hackers Could Read Your Hotmail, MSN, And Outlook Emails By Abusing Microsoft Support By packetstormsecurity.com Published On :: Mon, 15 Apr 2019 16:32:54 GMT Full Article headline hacker privacy microsoft email flaw
science and technology Facebook Uploaded Email Contacts For 1.5m Users Without Consent By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:20 GMT Full Article headline privacy email data loss fraud facebook social
science and technology Microsoft Outlook Email Breach Targeted Cryptocurrency Users By packetstormsecurity.com Published On :: Tue, 30 Apr 2019 00:59:50 GMT Full Article headline hacker privacy microsoft email data loss cryptography