or Imperial College COVID-19 Response Team Report By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 17:09:42 GMT The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks. Full Article
or iFileExplorer Free Directory Traversal By packetstormsecurity.com Published On :: Sat, 05 Mar 2011 01:11:28 GMT iFileExplorer Free for iPod Touch / iPhone version 2.8 suffers from a remote directory traversal vulnerability. Full Article
or Checkview 1.1 For iPhone / iPod Touch Directory Traversal By packetstormsecurity.com Published On :: Tue, 15 Mar 2011 01:28:26 GMT Checkview version 1.1 for iPhone / iPod Touch suffers from a directory traversal vulnerability. Full Article
or Zero Day Initiative Advisory 11-109 By packetstormsecurity.com Published On :: Tue, 22 Mar 2011 20:31:31 GMT Zero Day Initiative Advisory 11-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on the iPhone. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the support for parsing Office files. When handling the OfficeArtMetafileHeader the process trusts the cbSize field and performs arithmetic on it before making an allocation. As the result is not checked for overflow, the subsequent allocation can be undersized. Later when copying into this buffer, memory can be corrupted leading to arbitrary code execution under the context of the mobile user on the iPhone. Full Article
or Secunia Security Advisory 43832 By packetstormsecurity.com Published On :: Thu, 24 Mar 2011 08:52:53 GMT Secunia Security Advisory - A vulnerability has been reported in Apple iPhone iOS, which can be exploited by malicious people to compromise a vulnerable device. Full Article
or Secunia Security Advisory 44154 By packetstormsecurity.com Published On :: Sun, 17 Apr 2011 06:25:13 GMT Secunia Security Advisory - Some vulnerabilities has been reported in Apple iOS for iPhone 4 (CDMA), which can be exploited by malicious people to compromise a vulnerable device. Full Article
or iPhone/iPad Phone Drive 1.1.1 Directory Traversal By packetstormsecurity.com Published On :: Tue, 09 Aug 2011 16:54:28 GMT iPhone/iPad Phone Drive version 1.1.1 suffers from a directory traversal vulnerability. Full Article
or iPhone Forensics On iOS 5 By packetstormsecurity.com Published On :: Fri, 20 Jan 2012 13:22:22 GMT This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone. Full Article
or Forensic Analysis Of iPhone Backups By packetstormsecurity.com Published On :: Thu, 12 Jul 2012 11:11:11 GMT This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups. Full Article
or Packet Storm Exploit 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:37:10 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8. Earlier versions may also be affected. It was obtained through the Packet Storm Bug Bounty program. Full Article
or Packet Storm Advisory 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:55:53 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. This method accepts the user-defined JavaScript function and calls it from the native code to compare array items. If this compare function reduces array length, then the trailing array items will be written outside the "m_storage->m_vector[]" buffer, which leads to the heap memory corruption. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
or WordPress Windows Desktop And iPhone Photo Uploader File Upload By packetstormsecurity.com Published On :: Thu, 09 Apr 2015 03:33:33 GMT WordPress Windows Desktop and iPhone Photo Uploader plugin suffers from a remote shell upload vulnerability. Full Article
or Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article
or Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:44:33 GMT Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing. Full Article
or iPhone iMessage Malformed Message Bricking By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:34:02 GMT An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString. Full Article
or 809 Million Records Exposed By Email Marketing Giant By packetstormsecurity.com Published On :: Fri, 08 Mar 2019 15:35:18 GMT Full Article headline privacy email data loss
or Hackers Could Read Your Hotmail, MSN, And Outlook Emails By Abusing Microsoft Support By packetstormsecurity.com Published On :: Mon, 15 Apr 2019 16:32:54 GMT Full Article headline hacker privacy microsoft email flaw
or Facebook Uploaded Email Contacts For 1.5m Users Without Consent By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:20 GMT Full Article headline privacy email data loss fraud facebook social
or The Russians Are Using A Clever Microsoft Exchange Backdoor By packetstormsecurity.com Published On :: Tue, 07 May 2019 14:34:46 GMT Full Article headline government microsoft email russia cyberwar spyware backdoor
or Ex-Yahoo Engineer Hacked Accounts Seeking Porn By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:49:58 GMT Full Article headline hacker privacy email cybercrime fraud password yahoo
or Sextortion Botnet Spreads 30,000 Emails An Hour By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 14:45:04 GMT Full Article headline email cybercrime botnet fraud
or Texas School District Falls For Email Scam, Hands Over $2.3 Million By packetstormsecurity.com Published On :: Mon, 13 Jan 2020 15:34:23 GMT Full Article headline government email bank usa cybercrime fraud
or Love Bug's Creator Tracked Down To Repair Shop In Manila By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:03 GMT Full Article headline malware email virus
or Coronavirus: Facebook Blames Bug For Incorrectly Marked Spam By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:52 GMT Full Article headline virus spam facebook
or Red Hat Security Advisory 2020-1561-01 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:35:15 GMT Red Hat Security Advisory 2020-1561-01 - Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. HTTP request smuggling vulnerabilities were addressed. Full Article
or Red Hat Security Advisory 2020-1660-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:18:21 GMT Red Hat Security Advisory 2020-1660-01 - The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server. Issues addressed include an open redirection vulnerability. Full Article
or Red Hat Security Advisory 2020-1792-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:57 GMT Red Hat Security Advisory 2020-1792-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include buffer overflow and double free vulnerabilities. Full Article
or Red Hat Security Advisory 2020-1725-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:32:02 GMT Red Hat Security Advisory 2020-1725-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include a HTTP request smuggling vulnerability. Full Article
or Red Hat Security Advisory 2020-1576-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:36:23 GMT Red Hat Security Advisory 2020-1576-01 - memcached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load. Issues addressed include a denial of service vulnerability. Full Article
or Red Hat Security Advisory 2020-1624-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:37:45 GMT Red Hat Security Advisory 2020-1624-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include buffer overflow, information leakage, integer overflow, and out of bounds read vulnerabilities. Full Article
or Red Hat Security Advisory 2020-1962-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:59:54 GMT Red Hat Security Advisory 2020-1962-01 - Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Issues addressed include an HTTP request smuggling vulnerability. Full Article
or Red Hat Security Advisory 2020-1963-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:04:53 GMT Red Hat Security Advisory 2020-1963-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include HTTP response splitting and buffer under-read vulnerabilities. Full Article
or Red Hat Security Advisory 2020-1970-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 17:22:44 GMT Red Hat Security Advisory 2020-1970-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 81.0.4044.122. Issues addressed include out of bounds read and use-after-free vulnerabilities. Full Article
or Red Hat Security Advisory 2020-1981-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:45 GMT Red Hat Security Advisory 2020-1981-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 81.0.4044.129. Issues addressed include a use-after-free vulnerability. Full Article
or Red Hat Security Advisory 2020-1936-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:06:58 GMT Red Hat Security Advisory 2020-1936-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include HTTP request smuggling and out of bounds write vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2033-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:38:29 GMT Red Hat Security Advisory 2020-2033-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2032-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:38:46 GMT Red Hat Security Advisory 2020-2032-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2031-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:40:14 GMT Red Hat Security Advisory 2020-2031-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2037-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:42:31 GMT Red Hat Security Advisory 2020-2037-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2036-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:45:03 GMT Red Hat Security Advisory 2020-2036-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2039-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:48:42 GMT Red Hat Security Advisory 2020-2039-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2038-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:51:01 GMT Red Hat Security Advisory 2020-2038-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2041-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:51:23 GMT Red Hat Security Advisory 2020-2041-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
or Red Hat Security Advisory 2020-2040-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:54:10 GMT Red Hat Security Advisory 2020-2040-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
or Extreme Networks Aerohive HiveOS 11.x Denial Of Service By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:54:35 GMT Extreme Networks Aerohive HiveOS versions 11.x and below remote denial of service exploit. An unauthenticated malicious user can trigger a denial of service (DoS) attack when sending specific application layer packets towards the Aerohive NetConfig UI. This proof of concept exploit renders the application unusable for 305 seconds or 5 minutes with a single HTTP request using the action.php5 script calling the CliWindow function thru the _page parameter, denying access to the web server hive user interface. Full Article
or Red Hat Security Advisory 2020-0431-01 By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:50:02 GMT Red Hat Security Advisory 2020-0431-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
or Linux/x86 Bind Shell Generator Shellcode By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 01:11:11 GMT 114 bytes small Linux/x86 bind shell generator shellcode. Full Article
or Red Hat Security Advisory 2020-0515-01 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:26:14 GMT Red Hat Security Advisory 2020-0515-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
or Red Hat Security Advisory 2020-0559-01 By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:13:20 GMT Red Hat Security Advisory 2020-0559-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability was addressed. Full Article
or Red Hat Security Advisory 2020-0568-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:06:40 GMT Red Hat Security Advisory 2020-0568-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability was addressed. Full Article