k QuickHeal Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:04:41 GMT The QuickHeal parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (GPFLAG) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
k Checkview 1.1 For iPhone / iPod Touch Directory Traversal By packetstormsecurity.com Published On :: Tue, 15 Mar 2011 01:28:26 GMT Checkview version 1.1 for iPhone / iPod Touch suffers from a directory traversal vulnerability. Full Article
k Hacking iOS Devices By packetstormsecurity.com Published On :: Wed, 07 Dec 2011 16:09:44 GMT Whitepaper called Hacking Dispositivos iOS. It demonstrates how dangerous it is to be connected to a wireless network with an iOS device that has OpenSSH enabled. Written in Spanish. Full Article
k Forensic Analysis Of iPhone Backups By packetstormsecurity.com Published On :: Thu, 12 Jul 2012 11:11:11 GMT This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups. Full Article
k Air Disk Wireless 1.9 LFI / Command Injection By packetstormsecurity.com Published On :: Fri, 08 Feb 2013 03:40:19 GMT Air Disk Wireless version 1.9 for iPad and iPhone suffers from local file inclusion and command injection vulnerabilities. Full Article
k Packet Storm Exploit 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:37:10 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8. Earlier versions may also be affected. It was obtained through the Packet Storm Bug Bounty program. Full Article
k Packet Storm Advisory 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:55:53 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. This method accepts the user-defined JavaScript function and calls it from the native code to compare array items. If this compare function reduces array length, then the trailing array items will be written outside the "m_storage->m_vector[]" buffer, which leads to the heap memory corruption. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
k WordPress Windows Desktop And iPhone Photo Uploader File Upload By packetstormsecurity.com Published On :: Thu, 09 Apr 2015 03:33:33 GMT WordPress Windows Desktop and iPhone Photo Uploader plugin suffers from a remote shell upload vulnerability. Full Article
k iPhone iMessage Malformed Message Bricking By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:34:02 GMT An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString. Full Article
k Hackers Wipe US Servers Of Email Provider VFEmail By packetstormsecurity.com Published On :: Tue, 12 Feb 2019 17:37:49 GMT Full Article headline hacker privacy email data loss
k Video: Wikileaks Rears Its Head In Cohen Testimony Against Trump By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 03:03:48 GMT Full Article headline government email usa britain russia data loss fraud
k 809 Million Records Exposed By Email Marketing Giant By packetstormsecurity.com Published On :: Fri, 08 Mar 2019 15:35:18 GMT Full Article headline privacy email data loss
k Hackers Could Read Your Hotmail, MSN, And Outlook Emails By Abusing Microsoft Support By packetstormsecurity.com Published On :: Mon, 15 Apr 2019 16:32:54 GMT Full Article headline hacker privacy microsoft email flaw
k Facebook Uploaded Email Contacts For 1.5m Users Without Consent By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:20 GMT Full Article headline privacy email data loss fraud facebook social
k Microsoft Outlook Email Breach Targeted Cryptocurrency Users By packetstormsecurity.com Published On :: Tue, 30 Apr 2019 00:59:50 GMT Full Article headline hacker privacy microsoft email data loss cryptography
k The Russians Are Using A Clever Microsoft Exchange Backdoor By packetstormsecurity.com Published On :: Tue, 07 May 2019 14:34:46 GMT Full Article headline government microsoft email russia cyberwar spyware backdoor
k Microsoft Warns Of Email Attacks Executing Code Using An Old Bug By packetstormsecurity.com Published On :: Tue, 11 Jun 2019 14:55:53 GMT Full Article headline malware microsoft email flaw
k Exim Email Servers Are Now Under Attack By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:47 GMT Full Article headline hacker privacy email flaw
k Facebook Emails Seem To Show Zuck Knew Of Privacy Issues By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:51 GMT Full Article headline privacy email data loss facebook
k UNICEF Leaks Personal Data Of 8,000 Users Via Email Blunder By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:30:26 GMT Full Article headline privacy email data loss
k Ex-Yahoo Engineer Hacked Accounts Seeking Porn By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:49:58 GMT Full Article headline hacker privacy email cybercrime fraud password yahoo
k Microsoft Exchange Server Flaw Exploited In APT Attacks By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 12:56:23 GMT Full Article headline hacker microsoft email data loss flaw
k Love Bug's Creator Tracked Down To Repair Shop In Manila By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:03 GMT Full Article headline malware email virus
k Coronavirus: Facebook Blames Bug For Incorrectly Marked Spam By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:52 GMT Full Article headline virus spam facebook
k Extreme Networks Aerohive HiveOS 11.x Denial Of Service By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:54:35 GMT Extreme Networks Aerohive HiveOS versions 11.x and below remote denial of service exploit. An unauthenticated malicious user can trigger a denial of service (DoS) attack when sending specific application layer packets towards the Aerohive NetConfig UI. This proof of concept exploit renders the application unusable for 305 seconds or 5 minutes with a single HTTP request using the action.php5 script calling the CliWindow function thru the _page parameter, denying access to the web server hive user interface. Full Article
k TP-LINK Cloud Cameras NCXXX Bonjour Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 22:22:22 GMT TP-LINK Cloud Cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a command injection vulnerability. The issue is located in the swSystemSetProductAliasCheck method of the ipcamera binary (Called when setting a new alias for the device via /setsysname.fcgi), where despite a check on the name length, no other checks are in place in order to prevent shell metacharacters from being introduced. The system name would then be used in swBonjourStartHTTP as part of a shell command where arbitrary commands could be injected and executed as root. Full Article
k IBM Data Risk Manager 2.0.3 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:12:14 GMT IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
k Fintech Locations of the Future 2019/20: London tops first ranking By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:49 +0000 London has been named fDi’s inaugural Fintech Location of the Future for 2019/20, followed by Singapore and Belfast. Full Article
k What makes a successful free zone? By www.fdiintelligence.com Published On :: Thu, 17 Oct 2019 11:00:38 +0000 Dr Samir Hamrouni, CEO of the World Free Zones Organization, outlines the attributes that are essential to flourishing free zones. Full Article
k Linux Kernel Spectre V2 Defense Caused Massive Slowdown By packetstormsecurity.com Published On :: Tue, 20 Nov 2018 15:06:31 GMT Full Article headline linux flaw patch intel
k New Hardware Agnostic Side Channel Attack By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 01:59:45 GMT Full Article headline microsoft linux flaw
k Linux Kernel Quickly Patched To Mitigate New Vuln By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 15:08:31 GMT Full Article headline linux data loss flaw patch
k SpeakUp Linux Backdoor Sets Up For Major Attack By packetstormsecurity.com Published On :: Mon, 04 Feb 2019 15:20:15 GMT Full Article headline hacker linux botnet backdoor
k Container Escape Hack Targets Vulnerable Linux Kernel By packetstormsecurity.com Published On :: Mon, 04 Mar 2019 15:36:46 GMT Full Article headline linux flaw
k Linux Backdoor Found In The Wild Escaped AV Detection By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:40 GMT Full Article headline malware linux virus backdoor
k Canonical GitHub Account Hacked, Ubuntu Source Code Safe By packetstormsecurity.com Published On :: Sun, 07 Jul 2019 14:21:40 GMT Full Article headline hacker linux
k Researchers Find Security Flaws In 40 Kernel Drivers From 20 Vendors By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:44 GMT Full Article headline linux flaw conference
k Thousands Of Servers Infected With Lilocked Ransomware By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 14:45:48 GMT Full Article headline malware linux
k Linux Bug Opens Most VPNs To Hijacking By packetstormsecurity.com Published On :: Mon, 09 Dec 2019 15:12:01 GMT Full Article headline hacker privacy linux flaw cryptography
k Lazarus Pivots To Linux Attacks Through Dacls Trojan By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:36:58 GMT Full Article headline malware linux trojan backdoor
k Windows, Ubuntu, macOS, VirtualBox Fall At Pwn2Own Hacking Contest By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:12:03 GMT Full Article headline microsoft linux flaw apple conference
k Hackers Have Been Quietly Targeting Linux Servers By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:08 GMT Full Article headline hacker linux
k ChronIC RF Hacking Tool By packetstormsecurity.com Published On :: Tue, 12 Mar 2013 18:22:22 GMT ChronIC is the Chronos Integrated Commander, a wearable Sub-GHz RF hacking tool. Written in python. Full Article
k HWK Wireless Auditing Tool 0.4 By packetstormsecurity.com Published On :: Fri, 18 Oct 2013 01:30:01 GMT hwk is an easy-to-use wireless authentication and de-authentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types. Full Article
k SkyJack Drone Hijacker By packetstormsecurity.com Published On :: Wed, 04 Dec 2013 03:19:46 GMT Skyjack takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control. Full Article
k Aircrack-ng Wireless Network Tools 1.2 Beta 3 By packetstormsecurity.com Published On :: Tue, 01 Apr 2014 23:02:22 GMT aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.). Full Article
k Aircrack-ng Wireless Network Tools 1.2 RC2 By packetstormsecurity.com Published On :: Fri, 10 Apr 2015 22:05:23 GMT aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.). Full Article
k Aircrack-ng Wireless Network Tools 1.2 RC3 By packetstormsecurity.com Published On :: Sun, 22 Nov 2015 15:55:55 GMT aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.). Full Article
k Aircrack-ng Wireless Network Tools 1.2 RC4 By packetstormsecurity.com Published On :: Tue, 16 Feb 2016 17:29:48 GMT aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.). Full Article
k Aircrack-ng Wireless Network Tools 1.2 RC5 By packetstormsecurity.com Published On :: Wed, 11 Apr 2018 16:29:30 GMT aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.). Full Article