b Bitdefender Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:58:50 GMT The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (Compressed Size) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected. Full Article
b Bitdefender Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 16:00:02 GMT The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (RAR Compression Information) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected. Full Article
b ESET Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:29:59 GMT The ESET parsing engine can be bypassed by specifically manipulating a ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
b Kaspersky Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 04:44:44 GMT The Kaspersky parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (File Name length Field) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
b Bitdefender Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 11:01:11 GMT The Bitdefender parsing engine supports the GZIP archive format. The parsing engine can be bypassed by specifically manipulating a GZIP Archive (Compression Method) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
b AVAST Generic Archive Bypass By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 05:02:22 GMT The AVAST parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating a ZIP archive so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
b QuickHeal Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:04:41 GMT The QuickHeal parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (GPFLAG) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
b Forensic Analysis Of iPhone Backups By packetstormsecurity.com Published On :: Thu, 12 Jul 2012 11:11:11 GMT This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups. Full Article
b Transferable Remote 1.1 XSS / LFI / Command Injection By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 03:00:01 GMT Transferable Remote version 1.1 for iPad and iPhone suffers from cross site scripting, remote command injection, and local file inclusion vulnerabilities. Full Article
b Packet Storm Exploit 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:37:10 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8. Earlier versions may also be affected. It was obtained through the Packet Storm Bug Bounty program. Full Article
b Packet Storm Advisory 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:55:53 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. This method accepts the user-defined JavaScript function and calls it from the native code to compare array items. If this compare function reduces array length, then the trailing array items will be written outside the "m_storage->m_vector[]" buffer, which leads to the heap memory corruption. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
b Air Transfer Iphone 1.3.9 Arbitrary File Download By packetstormsecurity.com Published On :: Mon, 25 Aug 2014 09:33:33 GMT Air Transfer Iphone version 1.3.9 suffers from remote denial of service and unauthenticated file access vulnerabilities. Full Article
b Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article
b iPhone iMessage Malformed Message Bricking By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:34:02 GMT An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString. Full Article
b Microsoft Patches 0-Day Vulnerabilities In IE And Exchange By packetstormsecurity.com Published On :: Wed, 13 Feb 2019 15:01:51 GMT Full Article headline microsoft email flaw patch
b 809 Million Records Exposed By Email Marketing Giant By packetstormsecurity.com Published On :: Fri, 08 Mar 2019 15:35:18 GMT Full Article headline privacy email data loss
b Hackers Could Read Your Hotmail, MSN, And Outlook Emails By Abusing Microsoft Support By packetstormsecurity.com Published On :: Mon, 15 Apr 2019 16:32:54 GMT Full Article headline hacker privacy microsoft email flaw
b Facebook Uploaded Email Contacts For 1.5m Users Without Consent By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:20 GMT Full Article headline privacy email data loss fraud facebook social
b Microsoft Outlook Email Breach Targeted Cryptocurrency Users By packetstormsecurity.com Published On :: Tue, 30 Apr 2019 00:59:50 GMT Full Article headline hacker privacy microsoft email data loss cryptography
b The Russians Are Using A Clever Microsoft Exchange Backdoor By packetstormsecurity.com Published On :: Tue, 07 May 2019 14:34:46 GMT Full Article headline government microsoft email russia cyberwar spyware backdoor
b Shanghai Jiao Tong University Exposed 8.4TB Of Email Data By packetstormsecurity.com Published On :: Mon, 10 Jun 2019 19:57:39 GMT Full Article headline privacy email china data loss
b Microsoft Warns Of Email Attacks Executing Code Using An Old Bug By packetstormsecurity.com Published On :: Tue, 11 Jun 2019 14:55:53 GMT Full Article headline malware microsoft email flaw
b Facebook Emails Seem To Show Zuck Knew Of Privacy Issues By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:51 GMT Full Article headline privacy email data loss facebook
b UNICEF Leaks Personal Data Of 8,000 Users Via Email Blunder By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:30:26 GMT Full Article headline privacy email data loss
b Sextortion Botnet Spreads 30,000 Emails An Hour By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 14:45:04 GMT Full Article headline email cybercrime botnet fraud
b Google Patches Awesome XSS Vulnerability In Gmail Dynamic Email Feature By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:01:56 GMT Full Article headline email flaw google
b Love Bug's Creator Tracked Down To Repair Shop In Manila By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:03 GMT Full Article headline malware email virus
b Coronavirus: Facebook Blames Bug For Incorrectly Marked Spam By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:52 GMT Full Article headline virus spam facebook
b Linux/x86 Bind Shell Generator Shellcode By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 01:11:11 GMT 114 bytes small Linux/x86 bind shell generator shellcode. Full Article
b OpenSMTPD Out-Of-Bounds Read By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:32:56 GMT Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability, an out-of-bounds read introduced in December 2015, is exploitable remotely and leads to the execution of arbitrary shell commands. Full Article
b Ubuntu Security Notice USN-4294-1 By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 19:16:40 GMT Ubuntu Security Notice 4294-1 - It was discovered that OpenSMTPD mishandled certain input. A remote, unauthenticated attacker could use this vulnerability to execute arbitrary shell commands as any non-root user. It was discovered that OpenSMTPD did not properly handle hardlinks under certain conditions. An unprivileged local attacker could read the first line of any file on the filesystem. Full Article
b Metasploit Libnotify Arbitrary Command Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:36:46 GMT This Metasploit module exploits a shell command injection vulnerability in the libnotify plugin. This vulnerability affects Metasploit versions 5.0.79 and earlier. Full Article
b TP-LINK Cloud Cameras NCXXX Bonjour Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 22:22:22 GMT TP-LINK Cloud Cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a command injection vulnerability. The issue is located in the swSystemSetProductAliasCheck method of the ipcamera binary (Called when setting a new alias for the device via /setsysname.fcgi), where despite a check on the name length, no other checks are in place in order to prevent shell metacharacters from being introduced. The system name would then be used in swBonjourStartHTTP as part of a shell command where arbitrary commands could be injected and executed as root. Full Article
b IBM Data Risk Manager 2.0.3 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:12:14 GMT IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
b Greenfield FDI Performance Index 2019: Serbia storms to top By www.fdiintelligence.com Published On :: Mon, 12 Aug 2019 16:08:37 +0000 Research by fDi Intelligence reveals which countries receive more than their ‘expected share’ of FDI. Full Article
b fDi’s Global Free Zones of the Year 2019 – the winners By www.fdiintelligence.com Published On :: Mon, 14 Oct 2019 08:40:15 +0000 The UAE's DMCC takes home the top prize in fDi’s Global Free Zones of the Year for a fifth consecutive year. Full Article
b Nasty Security Bug Found And Fixed In Linux apt By packetstormsecurity.com Published On :: Wed, 23 Jan 2019 15:12:03 GMT Full Article headline linux flaw patch
b SpeakUp Linux Backdoor Sets Up For Major Attack By packetstormsecurity.com Published On :: Mon, 04 Feb 2019 15:20:15 GMT Full Article headline hacker linux botnet backdoor
b Outlaw Shellbot Infects Linux Servers To Mine For Monero By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 15:02:47 GMT Full Article headline hacker malware linux botnet fraud cryptography
b Container Escape Hack Targets Vulnerable Linux Kernel By packetstormsecurity.com Published On :: Mon, 04 Mar 2019 15:36:46 GMT Full Article headline linux flaw
b Linux Backdoor Found In The Wild Escaped AV Detection By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:40 GMT Full Article headline malware linux virus backdoor
b Linux Command-Line Editors Vulnerable To High Severity Bug By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 15:27:56 GMT Full Article headline linux flaw
b First-Ever Malware Strain Spotted Abusing New DoH Protocol By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 15:46:06 GMT Full Article headline malware linux dns denial of service
b Canonical GitHub Account Hacked, Ubuntu Source Code Safe By packetstormsecurity.com Published On :: Sun, 07 Jul 2019 14:21:40 GMT Full Article headline hacker linux
b Critical Linux Wi-Fi Bug Allows System Compromise By packetstormsecurity.com Published On :: Sat, 19 Oct 2019 15:36:59 GMT Full Article headline linux wireless flaw
b New Roboto Botnet Emerges Targeting Linux Servers Running Webmin By packetstormsecurity.com Published On :: Thu, 21 Nov 2019 15:02:01 GMT Full Article headline hacker malware linux botnet flaw
b Linux Bug Opens Most VPNs To Hijacking By packetstormsecurity.com Published On :: Mon, 09 Dec 2019 15:12:01 GMT Full Article headline hacker privacy linux flaw cryptography
b OpenSMTPD Library RCE Impacts BSD And Linux By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:06 GMT Full Article headline linux flaw bsd
b Windows, Ubuntu, macOS, VirtualBox Fall At Pwn2Own Hacking Contest By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:12:03 GMT Full Article headline microsoft linux flaw apple conference
b Hackers Have Been Quietly Targeting Linux Servers By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:08 GMT Full Article headline hacker linux