9 National Lottery Sentry MBA Hacker Gets 9 Months In Jail By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 15:30:48 GMT Full Article headline hacker britain cybercrime fraud
9 UK Privacy Advocates Warn Over COVID-19 Contact Tracing App By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:42 GMT Full Article headline government privacy virus phone britain
9 Look Who's Joined The Anti-Encryption Posse: Germany, Come On Down By packetstormsecurity.com Published On :: Fri, 16 Jun 2017 14:11:25 GMT Full Article headline government privacy usa britain germany backdoor cryptography
9 Spies Get To Keep Monitoring All Traffic At World's Biggest Internet Hub By packetstormsecurity.com Published On :: Fri, 01 Jun 2018 14:23:15 GMT Full Article headline government privacy germany spyware
9 Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow By packetstormsecurity.com Published On :: Sun, 14 Feb 2016 01:26:22 GMT Delta Industrial Automation DCISoft version 1.12.09 suffers from a stack buffer overflow vulnerability. Full Article
9 Anonymous Leaks Paris Climate Summit Officials' Private Data By packetstormsecurity.com Published On :: Sat, 05 Dec 2015 02:08:03 GMT Full Article headline government data loss france anonymous
9 How France's TV5 Was Almost Destroyed By Russian Hackers By packetstormsecurity.com Published On :: Mon, 10 Oct 2016 15:02:19 GMT Full Article headline government russia cyberwar france
9 France's Secure Telegram Replacement Hacked In An Hour By packetstormsecurity.com Published On :: Tue, 23 Apr 2019 16:22:03 GMT Full Article headline hacker government privacy phone flaw france
9 France To Block Facebook's Libra Cryptocurrency In Europe By packetstormsecurity.com Published On :: Fri, 13 Sep 2019 14:35:56 GMT Full Article headline government bank fraud france facebook social cryptography
9 Max Secure Anti Virus Plus 19.0.4.020 Insecure Permissions By packetstormsecurity.com Published On :: Sat, 30 Nov 2019 22:42:30 GMT Max Secure Anti Virus Plus version 19.0.4.020 suffers from an insecure permission vulnerability. Full Article
9 Imperial College COVID-19 Response Team Report By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 17:09:42 GMT The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks. Full Article
9 Zero Day Initiative Advisory 11-109 By packetstormsecurity.com Published On :: Tue, 22 Mar 2011 20:31:31 GMT Zero Day Initiative Advisory 11-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on the iPhone. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the support for parsing Office files. When handling the OfficeArtMetafileHeader the process trusts the cbSize field and performs arithmetic on it before making an allocation. As the result is not checked for overflow, the subsequent allocation can be undersized. Later when copying into this buffer, memory can be corrupted leading to arbitrary code execution under the context of the mobile user on the iPhone. Full Article
9 Air Disk Wireless 1.9 LFI / Command Injection By packetstormsecurity.com Published On :: Fri, 08 Feb 2013 03:40:19 GMT Air Disk Wireless version 1.9 for iPad and iPhone suffers from local file inclusion and command injection vulnerabilities. Full Article
9 Packet Storm Exploit 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:37:10 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8. Earlier versions may also be affected. It was obtained through the Packet Storm Bug Bounty program. Full Article
9 Packet Storm Advisory 2013-0903-1 - Apple Safari Heap Buffer Overflow By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:55:53 GMT A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. This method accepts the user-defined JavaScript function and calls it from the native code to compare array items. If this compare function reduces array length, then the trailing array items will be written outside the "m_storage->m_vector[]" buffer, which leads to the heap memory corruption. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
9 Air Transfer Iphone 1.3.9 Arbitrary File Download By packetstormsecurity.com Published On :: Mon, 25 Aug 2014 09:33:33 GMT Air Transfer Iphone version 1.3.9 suffers from remote denial of service and unauthenticated file access vulnerabilities. Full Article
9 809 Million Records Exposed By Email Marketing Giant By packetstormsecurity.com Published On :: Fri, 08 Mar 2019 15:35:18 GMT Full Article headline privacy email data loss
9 Love Bug's Creator Tracked Down To Repair Shop In Manila By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:03 GMT Full Article headline malware email virus
9 Red Hat Security Advisory 2020-1792-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:57 GMT Red Hat Security Advisory 2020-1792-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include buffer overflow and double free vulnerabilities. Full Article
9 Red Hat Security Advisory 2020-1962-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:59:54 GMT Red Hat Security Advisory 2020-1962-01 - Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Issues addressed include an HTTP request smuggling vulnerability. Full Article
9 Red Hat Security Advisory 2020-1963-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:04:53 GMT Red Hat Security Advisory 2020-1963-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include HTTP response splitting and buffer under-read vulnerabilities. Full Article
9 Red Hat Security Advisory 2020-1970-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 17:22:44 GMT Red Hat Security Advisory 2020-1970-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 81.0.4044.122. Issues addressed include out of bounds read and use-after-free vulnerabilities. Full Article
9 Red Hat Security Advisory 2020-1981-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:45 GMT Red Hat Security Advisory 2020-1981-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 81.0.4044.129. Issues addressed include a use-after-free vulnerability. Full Article
9 Red Hat Security Advisory 2020-1936-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:06:58 GMT Red Hat Security Advisory 2020-1936-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include HTTP request smuggling and out of bounds write vulnerabilities. Full Article
9 Red Hat Security Advisory 2020-2039-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:48:42 GMT Red Hat Security Advisory 2020-2039-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
9 Red Hat Security Advisory 2020-0559-01 By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:13:20 GMT Red Hat Security Advisory 2020-0559-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability was addressed. Full Article
9 Ubuntu Security Notice USN-4294-1 By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 19:16:40 GMT Ubuntu Security Notice 4294-1 - It was discovered that OpenSMTPD mishandled certain input. A remote, unauthenticated attacker could use this vulnerability to execute arbitrary shell commands as any non-root user. It was discovered that OpenSMTPD did not properly handle hardlinks under certain conditions. An unprivileged local attacker could read the first line of any file on the filesystem. Full Article
9 Red Hat Security Advisory 2020-0892-01 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:21:53 GMT Red Hat Security Advisory 2020-0892-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
9 Red Hat Security Advisory 2020-0903-01 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:22:41 GMT Red Hat Security Advisory 2020-0903-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
9 Red Hat Security Advisory 2020-0978-01 By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:48:50 GMT Red Hat Security Advisory 2020-0978-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
9 Red Hat Security Advisory 2020-1933-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:44:21 GMT Red Hat Security Advisory 2020-1933-01 - The targetcli package contains an administration shell for configuring Internet Small Computer System Interface, Fibre Channel over Ethernet, and other SCSI targets, using the Target Core Mod/Linux-IO kernel target subsystem. FCoE users also need to install and use the fcoe-utils package. A command execution vulnerability was addressed. Full Article
9 Island Economies of the Future 2019/20 – the results By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:26:23 +0000 Cyprus is ranked first in fDi’s Island Economies of the Future rankings, followed by the Dominican Republic and Sri Lanka. Cathy Mullan and Naomi Davies detail the results. Full Article
9 American Cities of the Future 2019/20 - the winners By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:24:30 +0000 New York continues to reign as leader of fDi’s American Cities of the Future 2019/20 ranking. San Francisco retains second place with Toronto rising to third. Naomi Davies reports. Full Article
9 American Cities of the Future 2019/20 – FDI strategy By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:25:52 +0000 A more detailed look at fDi's judges’ top five American Cities of the Future 2019/20 for FDI strategy. Naomi Davies reports. Full Article
9 Greenfield FDI Performance Index 2019: Serbia storms to top By www.fdiintelligence.com Published On :: Mon, 12 Aug 2019 16:08:37 +0000 Research by fDi Intelligence reveals which countries receive more than their ‘expected share’ of FDI. Full Article
9 Fintech Locations of the Future 2019/20: London tops first ranking By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:49 +0000 London has been named fDi’s inaugural Fintech Location of the Future for 2019/20, followed by Singapore and Belfast. Full Article
9 Asia-Pacific Cities of the Future 2019/20 – the winners By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:47 +0000 Singapore has retained its place at the top of fDi's Asia-Pacific Cities of the Future ranking, with Shanghai and Tokyo completing the top three list. Full Article
9 fDi’s Global Free Zones of the Year 2019 – the winners By www.fdiintelligence.com Published On :: Mon, 14 Oct 2019 08:40:15 +0000 The UAE's DMCC takes home the top prize in fDi’s Global Free Zones of the Year for a fifth consecutive year. Full Article
9 Tech Start-up FDI Attraction Index 2019 By www.fdiintelligence.com Published On :: Thu, 17 Oct 2019 11:00:13 +0000 Research by fDi Intelligence reveals which cities received the most tech start-up FDI relative to their population between 2016 and 2018, with European cities coming out on top. Full Article
9 Tourism Locations of the Future 2019/20 – FDI Strategy By www.fdiintelligence.com Published On :: Mon, 09 Dec 2019 08:33:03 +0000 Australia tops the FDI Strategy category of fDi's Tourism Locations of the Future 2019/20 rankings, followed by Costa Rica and Azerbaijan. Full Article
9 fDi Strategy Awards 2019 – the winners By www.fdiintelligence.com Published On :: Mon, 09 Dec 2019 08:32:42 +0000 Lithuania's Go Vilnius has been named fDi’s IPA of the Year for 2019, and organisations from across the globe are commended for their investment promotion and economic development activities. Full Article
9 Top fDi Performers 2019 By www.fdiintelligence.com Published On :: Mon, 09 Dec 2019 08:42:06 +0000 A look at the results of fDi’s rankings throughout 2019 finds that Singapore and New York dominated the year’s league tables, followed by Shanghai, Tokyo and London Full Article
9 World's Favorite Open-Source PDF Interpreter Needs Patching Again By packetstormsecurity.com Published On :: Thu, 24 Jan 2019 15:33:14 GMT Full Article headline linux flaw
9 Teltonika RUT9XX Unauthenticated OS Command Injection By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 16:16:15 GMT Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. Full Article
9 Teltonika RUT9XX Reflected Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 16:22:13 GMT Teltonika RUT9XX routers with firmware before 00.05.01.1 are prone to cross site scripting vulnerabilities in hotspotlogin.cgi due to insufficient user input sanitization. Full Article
9 Webmin 1.900 Remote Command Execution By packetstormsecurity.com Published On :: Fri, 18 Jan 2019 14:44:44 GMT This Metasploit module exploits an arbitrary command execution vulnerability in Webmin versions 1.900 and below. Any user authorized to the "Java file manager" and "Upload and Download" fields, to execute arbitrary commands with root privileges. In addition, "Running Processes" field must be authorized to discover the directory to be uploaded. A vulnerable file can be printed on the original files of the Webmin application. The vulnerable file we are uploading should be integrated with the application. Therefore, a ".cgi" file with the vulnerability belong to webmin application should be used. The module has been tested successfully with Webmin version 1.900 over Debian 4.9.18. Full Article
9 Ubuntu Security Notice USN-4059-1 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:09:51 GMT Ubuntu Security Notice 4059-1 - It was discovered that Squid incorrectly handled certain SNMP packets. A remote attacker could possibly use this issue to cause memory consumption, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that Squid incorrectly handled the cachemgr.cgi web module. A remote attacker could possibly use this issue to conduct cross-site scripting attacks. Various other issues were also addressed. Full Article
9 D-Link DIR-859 Unauthenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:26:01 GMT D-Link DIR-859 Routers are vulnerable to OS command injection via the UPnP interface. The vulnerability exists in /gena.cgi (function genacgi_main() in /htdocs/cgibin), which is accessible without credentials. Full Article
9 Mandriva Linux Security Advisory 2015-209 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:21:20 GMT Mandriva Linux Security Advisory 2015-209 - Update PHP packages address buffer over-read and overflow vulnerabilities. PHP has been updated to version 5.5.24, which fixes these issues and other bugs. Additionally the timezonedb packages has been upgraded to the latest version and the PECL packages which requires so has been rebuilt for php-5.5.24. Full Article
9 Mandriva Linux Security Advisory 2015-219 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:18:27 GMT Mandriva Linux Security Advisory 2015-219 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When parsing HTTP cookies, if the parsed cookie's path element consists of a single double-quote, libcurl would try to write to an invalid heap memory address. This could allow remote attackers to cause a denial of service. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user. Full Article