OK
https://packetstormsecurity.com/
United States
Country
AS10796
Network
February 14, 2020, 2:05 PM UTC
Date & Time
Websites
Websites
Web Connectivity Test
Runtime: 3.5s

On Feb 14, 2020 2:05 PM, https://packetstormsecurity.com/ was accessible when tested on AS10796 in United States.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
65.24.5.237
Query:
IN A packetstormsecurity.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
CNAME
packetstormsecurity.com
@
IN
A
198.84.60.198

TCP Connections

Connection to 198.84.60.198:443 succeeded.

HTTP Requests

URL
GET https://packetstormsecurity.com/
Response Headers
Expires:
0
X-Content-Type-Options:
nosniff
Transfer-Encoding:
chunked
Set-Cookie:
M=dl.packetstormsecurity.net; domain=.packetstormsecurity.com; path=/; expires=Mon, 5-May-2025 05:05:05 GMT
Strict-Transport-Security:
max-age=3600
Vary:
Accept-Encoding
Server:
EMX
Connection:
keep-alive
X-XSS-Protection:
1; mode=block
Cache-Control:
no-cache, no-store, private, must-revalidate, proxy-revalidate
Date:
Fri, 14 Feb 2020 14:11:07 GMT
X-Frame-Options:
SAMEORIGIN
Content-Type:
text/html; charset=utf-8
Response Body
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-type" content="text/html;charset=utf-8" />
<title>Packet Storm</title>
<meta name="description" content="Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers" />
<meta name="keywords" content="security,exploit,advisory,whitepaper,xss,csrf,overflow,scanner,vulnerability" />
<link rel="shortcut icon" href="/img/pss.ico" />
<link rel="stylesheet" media="screen,print,handheld" href="https://packetstatic.com/css1578596827/pss.css" type="text/css" />
<!--[if lt ie 8]><link rel="stylesheet" type="text/css" href="https://packetstatic.com/css1578596827/ie.css" /><![endif]-->
<script type="text/javascript" src="https://packetstatic.com/js1578596827/pt.js"></script>
<script type="text/javascript" src="https://packetstatic.com/js1578596827/pss.js"></script>
<link rel="search" type="application/opensearchdescription+xml" href="https://packetstormsecurity.com/opensearch.xml" title="Packet Storm Site Search" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Headlines" href="https://rss.packetstormsecurity.com/news/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Recent Files" href="https://rss.packetstormsecurity.com/files/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Exploits" href="https://rss.packetstormsecurity.com/files/tags/exploit/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Advisories" href="https://rss.packetstormsecurity.com/files/tags/advisory/" />
</head>
<body id="home">
<div id="t">
   <div id="tc">
      <a id="top" href="/"><img src="https://packetstatic.com/img1514015884/ps_logo.png" width="315" height="65" id="logo" alt="packet storm" /></a>
      <div id="slogan">exploit the possibilities
</div>
      <div id="account"><a href="https://packetstormsecurity.com/account/register/">Register</a> | <a href="https://packetstormsecurity.com/account/login/">Login</a></div>
      <div id="search">
        <form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search &#8230;" /><button type="submit"></button><div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files" /><input type="radio" value="news" name="s" id="s-news" /><input type="radio" value="users" name="s" id="s-users" /><input type="radio" value="authors" name="s" id="s-authors" /></div></form>
      </div>
   </div>
    <div id="tn"><div id="tnc">
        <a href="/" id="tn-home"><span>Home</span></a> <a href="/files/" id="tn-files"><span>Files</span></a> <a href="/news/" id="tn-news"><span>News</span></a> <a href="/services/" id="tn-services"><span>Services</span></a> <a href="/about/" id="tn-about"><span>About</span></a> <a href="/contact/" id="tn-contact"><span>Contact</span></a> <a href="/submit/" id="tn-submit"><span>Add New</span></a>
    </div></div>
    <div id="tn2"></div>
</div>

<div id="c">

 <div id="cc">
     <div id="m">
    

    
    
     
    
    <div id="news-headline"><dl id="N30936" class="news first">
<dd class="detail sd"><a href="/news/view/30936/Critical-XSS-Vulnerability-Patched-In-WordPress-Plugin-GDPR-Cookie-Consent.html"><img src="https://packetstatic.com/art/c/cookiemonster-420.jpg" width="420" alt="" /></a></dd>
<dt><a href="/news/view/30936/Critical-XSS-Vulnerability-Patched-In-WordPress-Plugin-GDPR-Cookie-Consent.html">Critical XSS Vulnerability Patched In WordPress Plugin GDPR Cookie Consent</a></dt>
</dl>
<dl id="N30933" class="news">
<dd class="detail sd"><a href="/news/view/30933/Pressure-Mounts-For-Swiss-Probe-Into-Spying-Operation.html"><img src="https://packetstatic.com/art/s/spytrenchcoat-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/30933/Pressure-Mounts-For-Swiss-Probe-Into-Spying-Operation.html">Pressure Mounts For Swiss Probe Into Spying Operation</a></dt>
</dl>
<dl id="N30935" class="news">
<dd class="detail sd"><a href="/news/view/30935/Czechs-Investigating-Avast-Over-Data-Collection-Policies.html"><img src="https://packetstatic.com/art/a/avast-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/30935/Czechs-Investigating-Avast-Over-Data-Collection-Policies.html">Czechs Investigating Avast Over Data Collection Policies</a></dt>
</dl>
<dl id="N30934" class="news">
<dd class="detail sd"><a href="/news/view/30934/SoundCloud-Tackles-DoS-Account-Takeover-Issues.html"><img src="https://packetstatic.com/art/s/soundcloud-100.jpg" width="100" alt="" /></a></dd>
<dt><a href="/news/view/30934/SoundCloud-Tackles-DoS-Account-Takeover-Issues.html">SoundCloud Tackles DoS, Account Takeover Issues</a></dt>
</dl>
</div><div id="files-home">
<h2>Recent Files</h2><a href="https://rss.packetstormsecurity.com/files/" class="rss-home"><img src="https://packetstatic.com/img1514015884/bt_rss.gif" width="16" height="16" alt="Files RSS Feed" /></a>
<div class="tab-box"><div id="lv" title="Toggle List View"></div><ul class="tabs"><li class="tab on"><a href="/files/">All</a></li><li class="tab"><a href="/files/tags/exploit/">Exploits</a></li><li class="tab"><a href="/files/tags/advisory/">Advisories</a></li><li class="tab"><a href="/files/tags/tool/">Tools</a></li><li class="tab"><a href="/files/tags/paper/">Whitepapers</a></li><li class="tab"><a href="/files/tags/">Other</a></li></ul><div class="tabs-cut"></div></div>
<div id="files-home-list">
<dl id="F156336" class="file first">
<dt><a class="ico application-x-gzip" href="/files/156336/Suricata-IDPE-5.0.2.html" title="Size: 22.6 MB">Suricata IDPE 5.0.2</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="16:09:16 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Site <a href="http://www.openinfosecfoundation.org/index.php/download-suricata">openinfosecfoundation.org</a></dd>
<dd class="detail"><p>Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It&#39;s capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.</p></dd>
<dd class="change"><span>Changes</span>: Addressed a segfault, a memory allocation error, and various other bugs. </dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/tool">tool</a>, <a href="/files/tags/intrusion_detection">intrusion detection</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/unix">unix</a></dd>
<dd class="act-links"><a href="/files/download/156336/suricata-5.0.2.tar.gz" title="Size: 22.6 MB" rel="nofollow">Download</a> | <a href="/files/favorite/156336/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156336/Suricata-IDPE-5.0.2.html">Comments <span class="cmnts">(1)</span></a></dd>
</dl>
<dl id="F156335" class="file">
<dt><a class="ico text-plain" href="/files/156335/Anviz-CrossChex-Buffer-Overflow.html" title="Size: 3 KB">Anviz CrossChex Buffer Overflow</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="16:00:02 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/14620/" class="person">Pedro Rodrigues</a>, <a href="/files/author/14621/" class="person">Luis Catarino</a>, <a href="/files/author/14748/" class="person">agalway-r7</a>, <a href="/files/author/14749/" class="person">adfoster-r7</a> | Site <a href="http://www.metasploit.com">metasploit.com</a></dd>
<dd class="detail"><p>This Metasploit modules waits for broadcasts from Ainz CrossChex looking for new devices, and returns a custom broadcast, triggering a stack buffer overflow.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/overflow">overflow</a></dd>
<dd class="act-links"><a href="/files/download/156335/crosschex_device_bof.rb.txt" title="Size: 3 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156335/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156335/Anviz-CrossChex-Buffer-Overflow.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156334" class="file">
<dt><a class="ico application-x-gzip" href="/files/156334/Samsung-dev-tsmux-Heap-Out-Of-Bounds-Write.html" title="Size: 2.5 KB">Samsung /dev/tsmux Heap Out-Of-Bounds Write</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:56:05 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/11596/" class="person">Google Security Research</a>, <a href="/files/author/12012/" class="person">ianbeer</a></dd>
<dd class="detail"><p>The Samsung kernel suffers from a heap out-of-bounds write in /dev/tsmux.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/kernel">kernel</a></dd>
<dd class="act-links"><a href="/files/download/156334/GS20200213155604.tgz" title="Size: 2.5 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156334/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156334/Samsung-dev-tsmux-Heap-Out-Of-Bounds-Write.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156333" class="file">
<dt><a class="ico application-x-gzip" href="/files/156333/XPC-Memory-Disclosure-Corruption.html" title="Size: 20.6 KB">XPC Memory Disclosure / Corruption</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:55:10 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/11596/" class="person">Google Security Research</a>, <a href="/files/author/12012/" class="person">ianbeer</a></dd>
<dd class="detail"><p>XPC fast path fails to ensure NULL termination of XPC strings, leading to memory disclosure and corruption vulnerabilities in XPC services.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/vulnerability">vulnerability</a></dd>
<dd class="act-links"><a href="/files/download/156333/GS20200213155509.tgz" title="Size: 20.6 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156333/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156333/XPC-Memory-Disclosure-Corruption.html">Comments <span class="cmnts">(1)</span></a></dd>
</dl>
<dl id="F156332" class="file">
<dt><a class="ico application-x-gzip" href="/files/156332/macOS-iOS-launchd-XPC-Message-Parsing-Memory-Corruption.html" title="Size: 5.1 KB">macOS / iOS launchd XPC Message Parsing Memory Corruption</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:53:01 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/11596/" class="person">Google Security Research</a>, <a href="/files/author/12012/" class="person">ianbeer</a></dd>
<dd class="detail"><p>launchd on macOS and iOS suffer from a memory corruption issue due to a lack of bounds checking when parsing XPC messages.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/ios">ios</a></dd>
<dd class="act-links"><a href="/files/download/156332/GS20200213155259.tgz" title="Size: 5.1 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156332/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156332/macOS-iOS-launchd-XPC-Message-Parsing-Memory-Corruption.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156331" class="file">
<dt><a class="ico text-plain" href="/files/156331/SuiteCRM-7.11.10-SQL-Injection.html" title="Size: 2.9 KB">SuiteCRM 7.11.10 SQL Injection</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:51:52 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/5967/" class="person">EgiX</a> | Site <a href="http://karmainsecurity.com/">karmainsecurity.com</a></dd>
<dd class="detail"><p>SuiteCRM versions 7.11.10 and below suffer from multiple remote SQL injection vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/vulnerability">vulnerability</a>, <a href="/files/tags/sql_injection">sql injection</a></dd>
<dd class="act-links"><a href="/files/download/156331/KIS-2020-05.txt" title="Size: 2.9 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156331/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156331/SuiteCRM-7.11.10-SQL-Injection.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156330" class="file">
<dt><a class="ico text-plain" href="/files/156330/Red-Hat-Security-Advisory-2020-0487-01.html" title="Size: 3.8 KB">Red Hat Security Advisory 2020-0487-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:51:11 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2020-0487-01 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Issues addressed include a buffer overflow vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/overflow">overflow</a>, <a href="/files/tags/root">root</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/156330/RHSA-2020-0487-01.txt" title="Size: 3.8 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156330/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156330/Red-Hat-Security-Advisory-2020-0487-01.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156329" class="file">
<dt><a class="ico text-plain" href="/files/156329/SuiteCRM-7.11.11-Broken-Access-Control-Local-File-Inclusion.html" title="Size: 1.6 KB">SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:49:06 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/5967/" class="person">EgiX</a> | Site <a href="http://karmainsecurity.com/">karmainsecurity.com</a></dd>
<dd class="detail"><p>SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/local">local</a>, <a href="/files/tags/file_inclusion">file inclusion</a></dd>
<dd class="act-links"><a href="/files/download/156329/KIS-2020-04.txt" title="Size: 1.6 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156329/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156329/SuiteCRM-7.11.11-Broken-Access-Control-Local-File-Inclusion.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156328" class="file">
<dt><a class="ico text-plain" href="/files/156328/OpenTFTP-1.66-Local-Privilege-Escalation.html" title="Size: 4.4 KB">OpenTFTP 1.66 Local Privilege Escalation</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:48:08 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/14636/" class="person">boku</a></dd>
<dd class="detail"><p>OpenTFTP version 1.66 suffers from a local privilege escalation vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/local">local</a></dd>
<dd class="act-links"><a href="/files/download/156328/opentftp166-escalate.txt" title="Size: 4.4 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156328/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156328/OpenTFTP-1.66-Local-Privilege-Escalation.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156327" class="file">
<dt><a class="ico text-plain" href="/files/156327/SuiteCRM-7.11.11-Bean-Manipulation.html" title="Size: 1.2 KB">SuiteCRM 7.11.11 Bean Manipulation</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:46:26 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/5967/" class="person">EgiX</a> | Site <a href="http://karmainsecurity.com/">karmainsecurity.com</a></dd>
<dd class="detail"><p>SuiteCRM versions 7.11.11 and below suffer from an action_saveHTMLField bean manipulation vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a></dd>
<dd class="act-links"><a href="/files/download/156327/KIS-2020-03.txt" title="Size: 1.2 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156327/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156327/SuiteCRM-7.11.11-Bean-Manipulation.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156326" class="file">
<dt><a class="ico text-plain" href="/files/156326/Pandora-FMS-7.0-Authenticated-Remote-Code-Execution.html" title="Size: 2.2 KB">Pandora FMS 7.0 Authenticated Remote Code Execution</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:45:03 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/14004/" class="person">Engin Demirbilek</a></dd>
<dd class="detail"><p>Pandora FMS version 7.0 suffers from an authenticated remote code execution vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/code_execution">code execution</a></dd>
<dd class="act-links"><a href="/files/download/156326/pandorafms70-exec.txt" title="Size: 2.2 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156326/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156326/Pandora-FMS-7.0-Authenticated-Remote-Code-Execution.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156325" class="file">
<dt><a class="ico text-plain" href="/files/156325/Red-Hat-Security-Advisory-2020-0497-01.html" title="Size: 3.9 KB">Red Hat Security Advisory 2020-0497-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:40:05 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2020-0497-01 - The release of Red Hat AMQ Online 1.3.3 serves as a replacement for AMQ online 1.3.2, and includes bug fixes and enhancements. Request smuggling and other security issues have been addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/156325/RHSA-2020-0497-01.txt" title="Size: 3.9 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156325/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156325/Red-Hat-Security-Advisory-2020-0497-01.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156324" class="file">
<dt><a class="ico text-plain" href="/files/156324/SuiteCRM-7.11.11-Phar-Deserialization.html" title="Size: 3 KB">SuiteCRM 7.11.11 Phar Deserialization</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:34:23 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/5967/" class="person">EgiX</a> | Site <a href="http://karmainsecurity.com/">karmainsecurity.com</a></dd>
<dd class="detail"><p>SuiteCRM versions 7.11.11 and below suffer from multiple phar deserialization vulnerabilities.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/vulnerability">vulnerability</a></dd>
<dd class="act-links"><a href="/files/download/156324/KIS-2020-02.txt" title="Size: 3 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156324/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156324/SuiteCRM-7.11.11-Phar-Deserialization.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156323" class="file">
<dt><a class="ico text-plain" href="/files/156323/AVIRA-Generic-Malformed-Container-Bypass.html" title="Size: 16.6 KB">AVIRA Generic Malformed Container Bypass</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:31:42 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/4462/" class="person">Thierry Zoller</a></dd>
<dd class="detail"><p>The AVIRA parsing engine can be bypassed by specifically manipulating the ZIP Archive (GPFLag) making the Avira parser believes the file to be encrypted although it isn&#39;t. This leads to the Endpoint ignoring the archive and the Avira Gateway Solutions to follow the &quot;File is encrypted&quot; logic.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="act-links"><a href="/files/download/156323/TZO-13-2020.txt" title="Size: 16.6 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156323/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156323/AVIRA-Generic-Malformed-Container-Bypass.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156322" class="file">
<dt><a class="ico text-plain" href="/files/156322/ESET-Generic-Malformed-Archive-Bypass.html" title="Size: 2.8 KB">ESET Generic Malformed Archive Bypass</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:29:59 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/4462/" class="person">Thierry Zoller</a></dd>
<dd class="detail"><p>The ESET parsing engine can be bypassed by specifically manipulating a ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a &quot;clean&quot; rating.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/virus">virus</a></dd>
<dd class="act-links"><a href="/files/download/156322/TZO-11-2020.txt" title="Size: 2.8 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156322/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156322/ESET-Generic-Malformed-Archive-Bypass.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156321" class="file">
<dt><a class="ico text-plain" href="/files/156321/SuiteCRM-7.11.11-Second-Order-PHP-Object-Injection.html" title="Size: 1.9 KB">SuiteCRM 7.11.11 Second-Order PHP Object Injection</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:26:44 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/5967/" class="person">EgiX</a> | Site <a href="http://karmainsecurity.com/">karmainsecurity.com</a></dd>
<dd class="detail"><p>SuiteCRM versions 7.11.11 and below suffer from a second-order php object injection vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/php">php</a></dd>
<dd class="act-links"><a href="/files/download/156321/KIS-2020-01.txt" title="Size: 1.9 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156321/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156321/SuiteCRM-7.11.11-Second-Order-PHP-Object-Injection.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156320" class="file">
<dt><a class="ico text-plain" href="/files/156320/WordPress-Ultimate-Member-2.1.3-Local-File-Inclusion.html" title="Size: 0.6 KB">WordPress Ultimate-Member 2.1.3 Local File Inclusion</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:24:56 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/14740/" class="person">Mehran Feizi</a></dd>
<dd class="detail"><p>WordPress Ultimate-Member plugin version 2.1.3 suffers from a local file inclusion vulnerability.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/local">local</a>, <a href="/files/tags/file_inclusion">file inclusion</a></dd>
<dd class="act-links"><a href="/files/download/156320/wpultimatemember213-lfi.txt" title="Size: 0.6 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156320/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156320/WordPress-Ultimate-Member-2.1.3-Local-File-Inclusion.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156319" class="file">
<dt><a class="ico application-pdf" href="/files/156319/Packet-Sniffer-To-Sniff-Sensitive-Credentials-Only.html" title="Size: 1 MB">Packet Sniffer To Sniff Sensitive Credentials Only</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="15:23:08 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/14562/" class="person">Roshan Poudel</a></dd>
<dd class="detail"><p>Whitepaper called Packet Sniffer to Sniff Sensitive Credentials Only.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/paper">paper</a></dd>
<dd class="act-links"><a href="/files/download/156319/packet-sniffer.pdf" title="Size: 1 MB" rel="nofollow">Download</a> | <a href="/files/favorite/156319/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156319/Packet-Sniffer-To-Sniff-Sensitive-Credentials-Only.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156318" class="file">
<dt><a class="ico application-x-zip" href="/files/156318/SweynTooth-Bluetooth-Exploits.html" title="Size: 3.2 MB">SweynTooth Bluetooth Exploits</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-13/" title="14:59:26 UTC">Feb 13, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/14747/" class="person">Matheus Garbelini</a> | Site <a href="https://github.com/Matheus-Garbelini/sweyntooth_bluetooth_low_energy_attacks">github.com</a></dd>
<dd class="detail"><p>SweynTooth captures a family of 12 vulnerabilities (more under non-disclosure) across different Bluetooth Low Energy (BLE) software development kits (SDKs) of six major system-on-a-chip (SoC) vendors. The vulnerabilities expose flaws in specific BLE SoC implementations that allow an attacker in radio range to trigger deadlocks, crashes and buffer overflows or completely bypass security depending on the circumstances.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/overflow">overflow</a>, <a href="/files/tags/vulnerability">vulnerability</a></dd>
<dd class="act-links"><a href="/files/download/156318/sweyntooth_bluetooth_low_energy_attacks-master.zip" title="Size: 3.2 MB" rel="nofollow">Download</a> | <a href="/files/favorite/156318/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156318/SweynTooth-Bluetooth-Exploits.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156317" class="file">
<dt><a class="ico text-plain" href="/files/156317/Samsung-SEND_FILE_WITH_HEADER-Use-After-Free.html" title="Size: 14.9 KB">Samsung SEND_FILE_WITH_HEADER Use-After-Free</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-12/" title="18:57:19 UTC">Feb 12, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/10455/" class="person">Jann Horn</a>, <a href="/files/author/11596/" class="person">Google Security Research</a></dd>
<dd class="detail"><p>Samsung suffers from a use-after-free vulnerability due to a missing lock in the SEND_FILE_WITH_HEADER handler in f_mtp_samsung.c.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a></dd>
<dd class="act-links"><a href="/files/download/156317/GS20200212185641.txt" title="Size: 14.9 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156317/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156317/Samsung-SEND_FILE_WITH_HEADER-Use-After-Free.html">Comments <span class="cmnts">(3)</span></a></dd>
</dl>
<dl id="F156316" class="file">
<dt><a class="ico application-x-gzip" href="/files/156316/Samsung-Kernel-PROCA-Use-After-Free-Double-Free.html" title="Size: 23.1 KB">Samsung Kernel PROCA Use-After-Free / Double-Free</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-12/" title="18:54:48 UTC">Feb 12, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/10455/" class="person">Jann Horn</a>, <a href="/files/author/11596/" class="person">Google Security Research</a></dd>
<dd class="detail"><p>The Samsung kernel has logic bug and locking issues in PROCA that can lead to use-after-free and double-free issues from an application&#39;s context.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/exploit">exploit</a>, <a href="/files/tags/kernel">kernel</a></dd>
<dd class="act-links"><a href="/files/download/156316/GS20200212185441.tgz" title="Size: 23.1 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156316/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156316/Samsung-Kernel-PROCA-Use-After-Free-Double-Free.html">Comments <span class="cmnts">(1)</span></a></dd>
</dl>
<dl id="F156315" class="file">
<dt><a class="ico text-plain" href="/files/156315/Red-Hat-Security-Advisory-2020-0481-01.html" title="Size: 3.9 KB">Red Hat Security Advisory 2020-0481-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-12/" title="18:53:35 UTC">Feb 12, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2020-0481-01 - Red Hat Fuse provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat A-MQ is a standards compliant messaging system that is tailored for use in mission critical applications. This patch is an update to Red Hat Fuse 6.3 and Red Hat A-MQ 6.3. Cross site scripting and various other issues have been addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/xss">xss</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/156315/RHSA-2020-0481-01.txt" title="Size: 3.9 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156315/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156315/Red-Hat-Security-Advisory-2020-0481-01.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156314" class="file">
<dt><a class="ico text-plain" href="/files/156314/Ubuntu-Security-Notice-USN-4277-1.html" title="Size: 2.1 KB">Ubuntu Security Notice USN-4277-1</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-12/" title="18:53:23 UTC">Feb 12, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/3695/" class="company">Ubuntu</a> | Site <a href="http://security.ubuntu.com/">security.ubuntu.com</a></dd>
<dd class="detail"><p>Ubuntu Security Notice 4277-1 - Liu Bingchang discovered that libexif incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information or cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. Lili Xu and Bingchang Liu discovered that libexif incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information or cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. Various other issues were also addressed.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/denial_of_service">denial of service</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/ubuntu">ubuntu</a></dd>
<dd class="act-links"><a href="/files/download/156314/USN-4277-1.txt" title="Size: 2.1 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156314/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156314/Ubuntu-Security-Notice-USN-4277-1.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156312" class="file">
<dt><a class="ico text-plain" href="/files/156312/Red-Hat-Security-Advisory-2020-0476-01.html" title="Size: 3.4 KB">Red Hat Security Advisory 2020-0476-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-12/" title="18:49:48 UTC">Feb 12, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2020-0476-01 - Red Hat OpenShift Container Platform is Red Hat&#39;s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An issue was addressed where kubeconfig and kubeadmin-password are created with word-readable permissions.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/156312/RHSA-2020-0476-01.txt" title="Size: 3.4 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156312/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156312/Red-Hat-Security-Advisory-2020-0476-01.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="F156311" class="file">
<dt><a class="ico text-plain" href="/files/156311/Red-Hat-Security-Advisory-2020-0463-01.html" title="Size: 3.3 KB">Red Hat Security Advisory 2020-0463-01</a></dt>
<dd class="datetime">Posted <a href="/files/date/2020-02-12/" title="18:48:41 UTC">Feb 12, 2020</a></dd>
<dd class="refer">Authored by <a href="/files/author/4676/" class="person">Red Hat</a> | Site <a href="https://access.redhat.com/security/team/contact/">access.redhat.com</a></dd>
<dd class="detail"><p>Red Hat Security Advisory 2020-0463-01 - Red Hat OpenShift Container Platform is Red Hat&#39;s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An issue was addressed where kubeconfig and kubeadmin-password are created with word-readable permissions.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/redhat">redhat</a></dd>
<dd class="act-links"><a href="/files/download/156311/RHSA-2020-0463-01.txt" title="Size: 3.3 KB" rel="nofollow">Download</a> | <a href="/files/favorite/156311/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/156311/Red-Hat-Security-Advisory-2020-0463-01.html">Comments <span>(0)</span></a></dd>
</dl>
</div>
<a id="files-home-next" href="/files/page2/" style="float:right; margin:10px 0;">View Older Files &rarr;</a>
</div>
    
    
     </div>
    
      <div id="adblock">
        
      </div>
      <div id="mn">
        <div class="mn-like-us">
<ul>
<li><a href="https://twitter.com/packet_storm"><img src="https://packetstatic.com/img1514015884/s_twitter.png" width="24" height="24" alt="Follow on Twitter" /> Follow us on Twitter</a></li>
<li><a href="https://www.facebook.com/packetstormfeed"><img src="https://packetstatic.com/img1514015884/s_facebook.png" width="24" height="24" alt="Follow on Facebook" /> Follow us on Facebook</a></li>
<li><a href="/feeds"><img src="https://packetstatic.com/img1514015884/s_rss.png" width="24" height="24" alt="View RSS Feeds" /> Subscribe to an RSS Feed</a></li>
</ul>
</div>

<div id="news-home">
<h2>Recent News</h2><a href="https://rss.packetstormsecurity.com/news/" class="rss-home"><img src="https://packetstatic.com/img1514015884/bt_rss.gif" width="16" height="16" alt="News RSS Feed" /></a><br />
<dl id="N30932" class="news first">
<dt><a href="/news/view/30932/People-Are-Jailbreaking-Used-Teslas-To-Get-Features-Expected.html">People Are Jailbreaking Used Teslas To Get Features Expected</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-12/" title="18:13:55 UTC">Feb 12, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/hacker">hacker</a></dd>
<dd class="act-links"><a href="https://www.vice.com/en_us/article/y3mb3w/people-are-jailbreaking-used-teslas-to-get-the-features-they-expect">Link</a> | <a href="/news/favorite/30932/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30932/People-Are-Jailbreaking-Used-Teslas-To-Get-Features-Expected.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30931" class="news">
<dt><a href="/news/view/30931/FBI-Says-Cybercrime-Profits-Reached-3.5-Billion-In-2019.html">FBI Says Cybercrime Profits Reached &#36;3.5 Billion In 2019</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-12/" title="18:13:50 UTC">Feb 12, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/cybercrime">cybercrime</a>, <a href="/news/tags/fraud">fraud</a>, <a href="/news/tags/fbi">fbi</a></dd>
<dd class="act-links"><a href="https://www.bbc.com/news/technology-51474109">Link</a> | <a href="/news/favorite/30931/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30931/FBI-Says-Cybercrime-Profits-Reached-3.5-Billion-In-2019.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30930" class="news">
<dt><a href="/news/view/30930/US-Says-It-Can-Prove-Huawei-Has-Backdoor-Access-To-Mobile-Phone-Networks.html">US Says It Can Prove Huawei Has Backdoor Access To Mobile Phone Networks</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-12/" title="18:13:47 UTC">Feb 12, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/usa">usa</a>, <a href="/news/tags/phone">phone</a>, <a href="/news/tags/china">china</a>, <a href="/news/tags/cyberwar">cyberwar</a>, <a href="/news/tags/backdoor">backdoor</a></dd>
<dd class="act-links"><a href="https://arstechnica.com/tech-policy/2020/02/us-gave-allies-evidence-that-huawei-can-snoop-on-phone-networks-wsj-says/">Link</a> | <a href="/news/favorite/30930/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30930/US-Says-It-Can-Prove-Huawei-Has-Backdoor-Access-To-Mobile-Phone-Networks.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30929" class="news">
<dt><a href="/news/view/30929/Apple-Joins-FIDO-Alliance-Commits-To-Getting-Rid-Of-Passwords.html">Apple Joins FIDO Alliance, Commits To Getting Rid Of Passwords</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-12/" title="18:13:41 UTC">Feb 12, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/password">password</a>, <a href="/news/tags/apple">apple</a></dd>
<dd class="act-links"><a href="https://www.zdnet.com/article/apple-joins-fido-alliance-commits-to-getting-rid-of-passwords/">Link</a> | <a href="/news/favorite/30929/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30929/Apple-Joins-FIDO-Alliance-Commits-To-Getting-Rid-Of-Passwords.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30928" class="news">
<dt><a href="/news/view/30928/Jail-Software-Left-Inmate-Data-Exposed-Online.html">Jail Software Left Inmate Data Exposed Online</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-11/" title="15:34:11 UTC">Feb 11, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/privacy">privacy</a>, <a href="/news/tags/data_loss">data loss</a></dd>
<dd class="act-links"><a href="https://www.vice.com/en_us/article/5dmybx/jail-software-left-inmate-data-exposed-online">Link</a> | <a href="/news/favorite/30928/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30928/Jail-Software-Left-Inmate-Data-Exposed-Online.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30927" class="news">
<dt><a href="/news/view/30927/Iranian-Internet-Attacked-Saturday-Knocked-Partially-Offline.html">Iranian Internet Attacked Saturday, Knocked Partially Offline</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-11/" title="15:34:05 UTC">Feb 11, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/denial_of_service">denial of service</a>, <a href="/news/tags/iran">iran</a></dd>
<dd class="act-links"><a href="https://www.scmagazine.com/home/security-news/government-and-defense/iranian-internet-attacked-saturday-knocked-partially-offline/">Link</a> | <a href="/news/favorite/30927/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30927/Iranian-Internet-Attacked-Saturday-Knocked-Partially-Offline.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30926" class="news">
<dt><a href="/news/view/30926/Emotet-Trojan-Evolves-To-Spread-Via-A-WiFi-Connection.html">Emotet Trojan Evolves To Spread Via A WiFi Connection</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-11/" title="15:34:01 UTC">Feb 11, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/malware">malware</a>, <a href="/news/tags/trojan">trojan</a>, <a href="/news/tags/wireless">wireless</a></dd>
<dd class="act-links"><a href="https://www.zdnet.com/article/emotet-trojan-evolves-to-spread-via-a-wifi-connection/">Link</a> | <a href="/news/favorite/30926/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30926/Emotet-Trojan-Evolves-To-Spread-Via-A-WiFi-Connection.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30925" class="news">
<dt><a href="/news/view/30925/US-Charges-Four-Chinese-Military-Officers-Over-Equifax-Hack.html">US Charges Four Chinese Military Officers Over Equifax Hack</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-11/" title="15:33:56 UTC">Feb 11, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/privacy">privacy</a>, <a href="/news/tags/bank">bank</a>, <a href="/news/tags/china">china</a>, <a href="/news/tags/cybercrime">cybercrime</a>, <a href="/news/tags/data_loss">data loss</a>, <a href="/news/tags/fraud">fraud</a>, <a href="/news/tags/cyberwar">cyberwar</a>, <a href="/news/tags/identity_theft">identity theft</a></dd>
<dd class="act-links"><a href="https://www.bbc.com/news/world-us-canada-51449778">Link</a> | <a href="/news/favorite/30925/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30925/US-Charges-Four-Chinese-Military-Officers-Over-Equifax-Hack.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30924" class="news">
<dt><a href="/news/view/30924/Netanyahus-Party-Exposes-Data-On-Over-6.4-Million-Israelis.html">Netanyahu&#39;s Party Exposes Data On Over 6.4 Million Israelis</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-10/" title="14:12:58 UTC">Feb 10, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/government">government</a>, <a href="/news/tags/privacy">privacy</a>, <a href="/news/tags/data_loss">data loss</a>, <a href="/news/tags/israel">israel</a></dd>
<dd class="act-links"><a href="https://www.zdnet.com/article/netanyahus-party-exposes-data-on-over-6-4-million-israelis/">Link</a> | <a href="/news/favorite/30924/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30924/Netanyahus-Party-Exposes-Data-On-Over-6.4-Million-Israelis.html">Comments <span>(0)</span></a></dd>
</dl>
<dl id="N30923" class="news">
<dt><a href="/news/view/30923/Why-Is-The-Healthcare-Industry-Still-So-Bad-At-Cybersecurity.html">Why Is The Healthcare Industry Still So Bad At Cybersecurity</a></dt>
<dd class="datetime">Posted <a href="/news/date/2020-02-10/" title="14:12:52 UTC">Feb 10, 2020</a></dd>
<dd class="posted-by"></dd>
<dd class="detail sd"><p></p></dd>
<dd class="tags"><span>tags</span> | <a href="/news/tags/headline">headline</a>, <a href="/news/tags/privacy">privacy</a>, <a href="/news/tags/data_loss">data loss</a></dd>
<dd class="act-links"><a href="https://arstechnica.com/information-technology/2020/02/why-is-the-healthcare-industry-still-so-bad-at-cybersecurity/">Link</a> | <a href="/news/favorite/30923/" class="fav" rel="nofollow">Favorite</a> | <a href="/news/30923/Why-Is-The-Healthcare-Industry-Still-So-Bad-At-Cybersecurity.html">Comments <span>(0)</span></a></dd>
</dl>

<a href="/news/" style="float:right; margin:10px 0;">View More News &rarr;</a>
</div>
<div>
<form id="cal" action="/files/cal/" method="get">
<h2>File Archive:</h2><h3>February 2020</h3>
<button id="cal-prev" name="cal-prev" type="button" value="2020-2"><span>&lt;</span></button><ul class="dotw"><li>Su</li><li>Mo</li><li>Tu</li><li>We</li><li>Th</li><li>Fr</li><li>Sa</li></ul>
<ul><li></li><li></li><li></li><li></li><li></li><li></li><li class="low"><a href="/files/date/2020-02-01/">1</a><div class="stats"><div class="point"></div><div class="date">Feb 1st</div><div class="count">1 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2020-02-02/">2</a><div class="stats"><div class="point"></div><div class="date">Feb 2nd</div><div class="count">2 Files</div></div></li><li class="med"><a href="/files/date/2020-02-03/">3</a><div class="stats"><div class="point"></div><div class="date">Feb 3rd</div><div class="count">17 Files</div></div></li><li class="med"><a href="/files/date/2020-02-04/">4</a><div class="stats"><div class="point"></div><div class="date">Feb 4th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2020-02-05/">5</a><div class="stats"><div class="point"></div><div class="date">Feb 5th</div><div class="count">24 Files</div></div></li><li class="med"><a href="/files/date/2020-02-06/">6</a><div class="stats"><div class="point"></div><div class="date">Feb 6th</div><div class="count">16 Files</div></div></li><li class="med"><a href="/files/date/2020-02-07/">7</a><div class="stats"><div class="point"></div><div class="date">Feb 7th</div><div class="count">19 Files</div></div></li><li class="low"><a href="/files/date/2020-02-08/">8</a><div class="stats"><div class="point"></div><div class="date">Feb 8th</div><div class="count">2 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2020-02-09/">9</a><div class="stats"><div class="point"></div><div class="date">Feb 9th</div><div class="count">2 Files</div></div></li><li class="med"><a href="/files/date/2020-02-10/">10</a><div class="stats"><div class="point"></div><div class="date">Feb 10th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2020-02-11/">11</a><div class="stats"><div class="point"></div><div class="date">Feb 11th</div><div class="count">20 Files</div></div></li><li class="med"><a href="/files/date/2020-02-12/">12</a><div class="stats"><div class="point"></div><div class="date">Feb 12th</div><div class="count">16 Files</div></div></li><li class="med"><a href="/files/date/2020-02-13/">13</a><div class="stats"><div class="point"></div><div class="date">Feb 13th</div><div class="count">19 Files</div></div></li><li class="none today"><a href="/files/date/2020-02-14/">14</a><div class="stats"><div class="point"></div><div class="date">Feb 14th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-15/">15</a><div class="stats"><div class="point"></div><div class="date">Feb 15th</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2020-02-16/">16</a><div class="stats"><div class="point"></div><div class="date">Feb 16th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-17/">17</a><div class="stats"><div class="point"></div><div class="date">Feb 17th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-18/">18</a><div class="stats"><div class="point"></div><div class="date">Feb 18th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-19/">19</a><div class="stats"><div class="point"></div><div class="date">Feb 19th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-20/">20</a><div class="stats"><div class="point"></div><div class="date">Feb 20th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-21/">21</a><div class="stats"><div class="point"></div><div class="date">Feb 21st</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-22/">22</a><div class="stats"><div class="point"></div><div class="date">Feb 22nd</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2020-02-23/">23</a><div class="stats"><div class="point"></div><div class="date">Feb 23rd</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-24/">24</a><div class="stats"><div class="point"></div><div class="date">Feb 24th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-25/">25</a><div class="stats"><div class="point"></div><div class="date">Feb 25th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-26/">26</a><div class="stats"><div class="point"></div><div class="date">Feb 26th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-27/">27</a><div class="stats"><div class="point"></div><div class="date">Feb 27th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-28/">28</a><div class="stats"><div class="point"></div><div class="date">Feb 28th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2020-02-29/">29</a><div class="stats"><div class="point"></div><div class="date">Feb 29th</div><div class="count">0 Files</div></div></li></ul>
</form></div>
<div id="mn-top-author" class="top-ten">
<h2>Top Authors In Last 30 Days</h2>
<ul>
<li><a href="/files/authors/4676">Red Hat</a> <span>92 files</span></li>
<li><a href="/files/authors/3695">Ubuntu</a> <span>54 files</span></li>
<li><a href="/files/authors/11596">Google Security Research</a> <span>20 files</span></li>
<li><a href="/files/authors/2821">Debian</a> <span>18 files</span></li>
<li><a href="/files/authors/14636">boku</a> <span>9 files</span></li>
<li><a href="/files/authors/2397">Apple</a> <span>8 files</span></li>
<li><a href="/files/authors/12728">Ihsan Sencan</a> <span>6 files</span></li>
<li><a href="/files/authors/14740">Mehran Feizi</a> <span>6 files</span></li>
<li><a href="/files/authors/13346">Ismail Tasdelen</a> <span>5 files</span></li>
<li><a href="/files/authors/11773">hyp3rlinx</a> <span>5 files</span></li>
</ul>
</div>
<div id="mn-tag-file"><h2>File Tags</h2><ul><li><a href="/files/tags/activex/">ActiveX</a> <span>(928)</span></li><li><a href="/files/tags/advisory/">Advisory</a> <span>(71,946)</span></li><li><a href="/files/tags/arbitrary/">Arbitrary</a> <span>(13,982)</span></li><li><a href="/files/tags/bbs/">BBS</a> <span>(2,859)</span></li><li><a href="/files/tags/bypass/">Bypass</a> <span>(1,347)</span></li><li><a href="/files/tags/cgi/">CGI</a> <span>(986)</span></li><li><a href="/files/tags/code_execution/">Code Execution</a> <span>(5,497)</span></li><li><a href="/files/tags/conference/">Conference</a> <span>(646)</span></li><li><a href="/files/tags/cracker/">Cracker</a> <span>(775)</span></li><li><a href="/files/tags/csrf/">CSRF</a> <span>(3,100)</span></li><li><a href="/files/tags/denial_of_service/">DoS</a> <span>(20,103)</span></li><li><a href="/files/tags/encryption/">Encryption</a> <span>(2,279)</span></li><li><a href="/files/tags/exploit/">Exploit</a> <span>(45,203)</span></li><li><a href="/files/tags/file_inclusion/">File Inclusion</a> <span>(4,016)</span></li><li><a href="/files/tags/file_upload/">File Upload</a> <span>(850)</span></li><li><a href="/files/tags/firewall/">Firewall</a> <span>(818)</span></li><li><a href="/files/tags/info_disclosure/">Info Disclosure</a> <span>(2,426)</span></li><li><a href="/files/tags/intrusion_detection/">Intrusion Detection</a> <span>(791)</span></li><li><a href="/files/tags/java/">Java</a> <span>(2,436)</span></li><li><a href="/files/tags/javascript/">JavaScript</a> <span>(702)</span></li><li><a href="/files/tags/kernel/">Kernel</a> <span>(5,249)</span></li><li><a href="/files/tags/local/">Local</a> <span>(13,381)</span></li><li><a href="/files/tags/magazine/">Magazine</a> <span>(578)</span></li><li><a href="/files/tags/overflow/">Overflow</a> <span>(11,117)</span></li><li><a href="/files/tags/perl/">Perl</a> <span>(1,376)</span></li><li><a href="/files/tags/php/">PHP</a> <span>(4,875)</span></li><li><a href="/files/tags/proof_of_concept/">Proof of Concept</a> <span>(2,151)</span></li><li><a href="/files/tags/protocol/">Protocol</a> <span>(2,878)</span></li><li><a href="/files/tags/python/">Python</a> <span>(1,182)</span></li><li><a href="/files/tags/remote/">Remote</a> <span>(27,438)</span></li><li><a href="/files/tags/root/">Root</a> <span>(3,257)</span></li><li><a href="/files/tags/ruby/">Ruby</a> <span>(527)</span></li><li><a href="/files/tags/scanner/">Scanner</a> <span>(1,553)</span></li><li><a href="/files/tags/tool/">Security Tool</a> <span>(7,214)</span></li><li><a href="/files/tags/shell/">Shell</a> <span>(2,775)</span></li><li><a href="/files/tags/shellcode/">Shellcode</a> <span>(1,135)</span></li><li><a href="/files/tags/sniffer/">Sniffer</a> <span>(856)</span></li><li><a href="/files/tags/spoof/">Spoof</a> <span>(1,947)</span></li><li><a href="/files/tags/sql_injection/">SQL Injection</a> <span>(15,266)</span></li><li><a href="/files/tags/tcp/">TCP</a> <span>(2,288)</span></li><li><a href="/files/tags/trojan/">Trojan</a> <span>(555)</span></li><li><a href="/files/tags/udp/">UDP</a> <span>(854)</span></li><li><a href="/files/tags/virus/">Virus</a> <span>(634)</span></li><li><a href="/files/tags/vulnerability/">Vulnerability</a> <span>(28,243)</span></li><li><a href="/files/tags/web/">Web</a> <span>(8,134)</span></li><li><a href="/files/tags/paper/">Whitepaper</a> <span>(3,490)</span></li><li><a href="/files/tags/x86/">x86</a> <span>(896)</span></li><li><a href="/files/tags/xss/">XSS</a> <span>(16,256)</span></li><li><a href="/files/tags/">Other</a></li></ul></div><div id="mn-arch-file"><h2>File Archives</h2><ul><li><a href="/files/date/2020-02/">February 2020</a></li><li><a href="/files/date/2020-01/">January 2020</a></li><li><a href="/files/date/2019-12/">December 2019</a></li><li><a href="/files/date/2019-11/">November 2019</a></li><li><a href="/files/date/2019-10/">October 2019</a></li><li><a href="/files/date/2019-09/">September 2019</a></li><li><a href="/files/date/2019-08/">August 2019</a></li><li><a href="/files/date/2019-07/">July 2019</a></li><li><a href="/files/date/2019-06/">June 2019</a></li><li><a href="/files/date/2019-05/">May 2019</a></li><li><a href="/files/date/2019-04/">April 2019</a></li><li><a href="/files/date/2019-03/">March 2019</a></li><li><a href="/files/date/">Older</a></li></ul></div><div id="mn-os-file"><h2>Systems</h2><ul><li><a href="/files/os/aix/">AIX</a> <span>(416)</span></li><li><a href="/files/os/apple/">Apple</a> <span>(1,703)</span></li><li><a href="/files/os/bsd/">BSD</a> <span>(366)</span></li><li><a href="/files/os/cisco/">Cisco</a> <span>(1,884)</span></li><li><a href="/files/os/debian/">Debian</a> <span>(5,933)</span></li><li><a href="/files/os/fedora/">Fedora</a> <span>(1,687)</span></li><li><a href="/files/os/freebsd/">FreeBSD</a> <span>(1,239)</span></li><li><a href="/files/os/gentoo/">Gentoo</a> <span>(3,733)</span></li><li><a href="/files/os/hpux/">HPUX</a> <span>(870)</span></li><li><a href="/files/os/ios/">iOS</a> <span>(238)</span></li><li><a href="/files/os/iphone/">iPhone</a> <span>(107)</span></li><li><a href="/files/os/irix/">IRIX</a> <span>(220)</span></li><li><a href="/files/os/juniper/">Juniper</a> <span>(67)</span></li><li><a href="/files/os/linux/">Linux</a> <span>(36,833)</span></li><li><a href="/files/os/osx/">Mac OS X</a> <span>(660)</span></li><li><a href="/files/os/mandriva/">Mandriva</a> <span>(3,105)</span></li><li><a href="/files/os/netbsd/">NetBSD</a> <span>(255)</span></li><li><a href="/files/os/openbsd/">OpenBSD</a> <span>(467)</span></li><li><a href="/files/os/redhat/">RedHat</a> <span>(8,063)</span></li><li><a href="/files/os/slackware/">Slackware</a> <span>(937)</span></li><li><a href="/files/os/solaris/">Solaris</a> <span>(1,587)</span></li><li><a href="/files/os/suse/">SUSE</a> <span>(1,444)</span></li><li><a href="/files/os/ubuntu/">Ubuntu</a> <span>(6,549)</span></li><li><a href="/files/os/unix/">UNIX</a> <span>(8,588)</span></li><li><a href="/files/os/unixware/">UnixWare</a> <span>(177)</span></li><li><a href="/files/os/windows/">Windows</a> <span>(5,593)</span></li><li><a href="/files/os/">Other</a></li></ul></div><div id="mn-tag-news"><h2>News Tags</h2><ul><li><a href="/news/tags/adobe/">Adobe</a> <span>(284)</span></li><li><a href="/news/tags/anonymous/">Anonymous</a> <span>(342)</span></li><li><a href="/news/tags/apple/">Apple</a> <span>(830)</span></li><li><a href="/news/tags/backdoor/">Backdoor</a> <span>(426)</span></li><li><a href="/news/tags/bank/">Bank</a> <span>(970)</span></li><li><a href="/news/tags/botnet/">Botnet</a> <span>(430)</span></li><li><a href="/news/tags/britain/">Britain</a> <span>(924)</span></li><li><a href="/news/tags/china/">China</a> <span>(668)</span></li><li><a href="/news/tags/conference/">Conference</a> <span>(261)</span></li><li><a href="/news/tags/cryptography/">Cryptography</a> <span>(762)</span></li><li><a href="/news/tags/cybercrime/">Cybercrime</a> <span>(1,508)</span></li><li><a href="/news/tags/cyberwar/">Cyberwar</a> <span>(1,216)</span></li><li><a href="/news/tags/data_loss/">Data Loss</a> <span>(2,721)</span></li><li><a href="/news/tags/denial_of_service/">DoS</a> <span>(410)</span></li><li><a href="/news/tags/email/">Email</a> <span>(381)</span></li><li><a href="/news/tags/facebook/">Facebook</a> <span>(670)</span></li><li><a href="/news/tags/fbi/">FBI</a> <span>(355)</span></li><li><a href="/news/tags/flaw/">Flaw</a> <span>(3,054)</span></li><li><a href="/news/tags/fraud/">Fraud</a> <span>(1,842)</span></li><li><a href="/news/tags/google/">Google</a> <span>(1,242)</span></li><li><a href="/news/tags/government/">Government</a> <span>(5,291)</span></li><li><a href="/news/tags/hacker/">Hacker</a> <span>(5,350)</span></li><li><a href="/news/tags/headline/">Headline</a> <span>(14,510)</span></li><li><a href="/news/tags/malware/">Malware</a> <span>(1,725)</span></li><li><a href="/news/tags/microsoft/">Microsoft</a> <span>(1,422)</span></li><li><a href="/news/tags/nsa/">NSA</a> <span>(640)</span></li><li><a href="/news/tags/password/">Password</a> <span>(519)</span></li><li><a href="/news/tags/patch/">Patch</a> <span>(677)</span></li><li><a href="/news/tags/phish/">Phish</a> <span>(255)</span></li><li><a href="/news/tags/phone/">Phone</a> <span>(1,469)</span></li><li><a href="/news/tags/privacy/">Privacy</a> <span>(3,512)</span></li><li><a href="/news/tags/russia/">Russia</a> <span>(688)</span></li><li><a href="/news/tags/scam/">Scam</a> <span>(272)</span></li><li><a href="/news/tags/science/">Science</a> <span>(364)</span></li><li><a href="/news/tags/social/">Social</a> <span>(326)</span></li><li><a href="/news/tags/space/">Space</a> <span>(218)</span></li><li><a href="/news/tags/spam/">Spam</a> <span>(365)</span></li><li><a href="/news/tags/spyware/">Spyware</a> <span>(1,075)</span></li><li><a href="/news/tags/terror/">Terror</a> <span>(340)</span></li><li><a href="/news/tags/trojan/">Trojan</a> <span>(286)</span></li><li><a href="/news/tags/twitter/">Twitter</a> <span>(293)</span></li><li><a href="/news/tags/usa/">USA</a> <span>(2,954)</span></li><li><a href="/news/tags/virus/">Virus</a> <span>(289)</span></li><li><a href="/news/tags/wireless/">Wireless</a> <span>(204)</span></li><li><a href="/news/tags/">Other</a></li></ul></div><div id="mn-arch-news"><h2>News Archives</h2><ul><li><a href="/news/date/2020-02/">February 2020</a></li><li><a href="/news/date/2020-01/">January 2020</a></li><li><a href="/news/date/2019-12/">December 2019</a></li><li><a href="/news/date/2019-11/">November 2019</a></li><li><a href="/news/date/2019-10/">October 2019</a></li><li><a href="/news/date/2019-09/">September 2019</a></li><li><a href="/news/date/2019-08/">August 2019</a></li><li><a href="/news/date/2019-07/">July 2019</a></li><li><a href="/news/date/2019-06/">June 2019</a></li><li><a href="/news/date/2019-05/">May 2019</a></li><li><a href="/news/date/2019-04/">April 2019</a></li><li><a href="/news/date/2019-03/">March 2019</a></li><li><a href="/news/date/">Older</a></li></ul></div>
      </div>

  </div>

</div>

<div id="f">
  <div id="fc">

    <div class="f-box" style="margin: 50px 0 0 0;">
        <a href="/"><img src="https://packetstatic.com/img1514015884/ps_logo.png" width="218" alt="packet storm" /></a>
    <p class="copy">&copy; 2016 Packet Storm. All rights reserved.</p>
    </div>

    <div class="f-box">
    <dl>
      <dt>Site Links</dt>
      <dd><a href="/news/date/">News by Month</a></dd>
      <dd><a href="/news/tags/">News Tags</a></dd>
      <dd><a href="/files/date/">Files by Month</a></dd>
      <dd><a href="/files/tags/">File Tags</a></dd>
      <dd><a href="/files/directory/">File Directory</a></dd>
    </dl>    
    </div>

    <div class="f-box">
    <dl>
      <dt>About Us</dt>
      <dd><a href="/about/">History &amp; Purpose</a></dd>
      <dd><a href="/contact/">Contact Information</a></dd>
      <dd><a href="/legal/tos.html">Terms of Service</a></dd>
      <dd><a href="/legal/privacy.html">Privacy Statement</a></dd>
      <dd><a href="/legal/copyright.html">Copyright Information</a></dd>
    </dl>
    </div>

    <div class="f-box">
	<dl>
      <dt>Services</dt>
      <dd><a href="/services/">Security Services</a></dd>
      <dt style="margin-top:1.5em;">Hosting By</dt>
      <dd><a href="http://www.rokasecurity.com/">Rokasec</a></dd>
    </dl>   
    </div>
    <div class="f-box">
    <ul class="f-follow">
     <li><a href="https://twitter.com/packet_storm"><img width="24" height="24" alt="Follow on Twitter" src="https://packetstatic.com/img1514015884/s_twitter.png" /> Follow us on Twitter</a></li>
     <li><a href="https://www.facebook.com/packetstormfeed"><img width="24" height="24" alt="Follow on Facebook" src="https://packetstatic.com/img1514015884/s_facebook.png" /> Follow us on Facebook</a></li>
     <li><a href="/feeds"><img width="24" height="24" alt="View RSS Feeds" src="https://packetstatic.com/img1514015884/s_rss.png" /> Subscribe to an RSS Feed</a></li>
    </ul>
    </div>

  </div>
</div>

<div id="o-box"><img src="https://packetstatic.com/img1514015884/o_close.png" alt="close" height="30" width="30" id="o-close" /><div id="o-main"></div></div>


<script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-18885198-1']); _gaq.push (['_gat._anonymizeIp']); _gaq.push(['_setDomainName', '.packetstormsecurity.com']); _gaq.push(['_trackPageview']); (function() {var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.googleanalytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);})(); </script><noscript><img src="https://ssl.google-analytics.com/__utm.gif?utmwv=1.3&amp;utmn=1423726163&amp;utmcs=ISO-8859-1&amp;utmsr=31337x31337&amp;utmsc=32-bit&amp;utmul=en-us&amp;utmje=0&amp;utmfl=-&amp;utmcn=1&amp;utmdt=%u2248%20Packet%20Storm&amp;utmhn=packetstormsecurity.com&amp;utmr=-&amp;utmp=%2F&amp;utmac=UA-18885198-1&amp;utmcc=__utma%3D32867617.1423726163.1581689467.1581689467.1581689467.1%3B%2B__utmz%3D32867617.1581689467.1.1.utmccn%3D(direct)%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none)" width="2" height="2" alt="" /></noscript>
<!-- Fri, 14 Feb 2020 14:11:07 GMT -->
</body>
</html>

Report ID

20200214T140525Z_AS10796_Y3P7CVUOip1K6AaqWIa2ZaoC3DRbZ0UUrWvNFBxvXMZJ7M0Ag4

Platform

android

OONI Probe version

2.2.0

Measurement Kit version

0.10.6

Raw Measurement Data