it E-Voting Experiments Ends In Norway Amid Security Fears By packetstormsecurity.com Published On :: Sun, 29 Jun 2014 16:46:22 GMT Full Article headline government flaw norway
it Hacker Site's Incriminating Database Published Online By Rivals By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:24 GMT Full Article headline hacker privacy database data loss cyberwar
it Gootkit Crew Left Database Exposed Without A Password By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 14:27:20 GMT Full Article headline malware database data loss fraud
it Another File Integrity Checker 2.13-1 By packetstormsecurity.com Published On :: Wed, 21 Jan 2009 01:47:16 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker By packetstormsecurity.com Published On :: Tue, 28 Jul 2009 15:00:09 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Check Rootkit 0.49 By packetstormsecurity.com Published On :: Thu, 30 Jul 2009 16:01:02 GMT Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11. Full Article
it iWatch Filesystem Monitor 0.2.2 By packetstormsecurity.com Published On :: Wed, 18 Nov 2009 14:01:05 GMT iWatch is a real-time filesystem monitoring program. It is a tool for detecting any changes on your filesystem and reporting it to the system administrator immediately. It uses a simple configuration file in XML format and is based on inotify, a file change notification system in the Linux kernel. Full Article
it Rootkit Hunter 1.3.6 By packetstormsecurity.com Published On :: Mon, 30 Nov 2009 22:01:27 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
it Another File Integrity Checker 2.15 By packetstormsecurity.com Published On :: Sat, 24 Apr 2010 02:44:33 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Rootkit Hunter 1.3.8 By packetstormsecurity.com Published On :: Thu, 18 Nov 2010 00:42:04 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
it Another File Integrity Checker 2.16 By packetstormsecurity.com Published On :: Wed, 15 Dec 2010 11:07:22 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 2.17 By packetstormsecurity.com Published On :: Fri, 10 Jun 2011 21:53:34 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 2.18 By packetstormsecurity.com Published On :: Tue, 11 Oct 2011 01:59:54 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 2.19 By packetstormsecurity.com Published On :: Wed, 16 Nov 2011 04:08:37 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 2.20 By packetstormsecurity.com Published On :: Tue, 07 Feb 2012 23:12:30 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 2.21 By packetstormsecurity.com Published On :: Tue, 17 Jul 2012 00:25:58 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 3.1 By packetstormsecurity.com Published On :: Thu, 26 Jul 2012 01:36:53 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 3.2 By packetstormsecurity.com Published On :: Wed, 14 Nov 2012 00:16:44 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 3.3 By packetstormsecurity.com Published On :: Thu, 27 Dec 2012 16:38:21 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Another File Integrity Checker 3.4 By packetstormsecurity.com Published On :: Tue, 10 Sep 2013 16:18:25 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
it Chkrootkit Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 20 Nov 2015 01:09:39 GMT Chkrootkit before 0.50 will run any executable file named /tmp/update as root, allowing a trivial privsec. WfsDelay is set to 24h, since this is how often a chkrootkit scan is scheduled by default. Full Article
it Apache OpenOffice Security Fixes Emerge By packetstormsecurity.com Published On :: Sat, 19 May 2012 01:35:07 GMT Full Article headline flaw patch apache
it Apache Server Status Pages Put Popular Websites At Risk By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 04:02:21 GMT Full Article headline privacy data loss flaw apache
it Hackers Hit Thousands Of Sites With Apache Backdoor By packetstormsecurity.com Published On :: Tue, 30 Apr 2013 00:02:31 GMT Full Article headline malware backdoor apache
it 1 In 20 Android Apps Hit By Apache Cordova Flaw By packetstormsecurity.com Published On :: Thu, 28 May 2015 13:47:45 GMT Full Article headline phone flaw google apache
it Apache Struts 2 Needs Patching, Without Delay. It's Under Attack Now. By packetstormsecurity.com Published On :: Thu, 09 Mar 2017 16:15:22 GMT Full Article headline hacker flaw apache
it Apache Struts 2 Bug Bites Canada, Cisco, VMware, And Others By packetstormsecurity.com Published On :: Tue, 14 Mar 2017 15:11:27 GMT Full Article headline canada flaw cisco apache
it Oracle Corrals And Patches Struts 2 Vulnerabilities By packetstormsecurity.com Published On :: Wed, 27 Sep 2017 06:32:18 GMT Full Article headline flaw patch oracle apache
it Apache Vulnerabilities Spotted In OpenWhisk And Tomcat By packetstormsecurity.com Published On :: Wed, 25 Jul 2018 17:02:58 GMT Full Article headline flaw apache
it Apache Struts Vulnerability Would Allow System Takeover By packetstormsecurity.com Published On :: Tue, 06 Nov 2018 23:26:37 GMT Full Article headline flaw apache
it Apache Hadoop Spins Cracking Code Injection Vulnerability YARN By packetstormsecurity.com Published On :: Mon, 26 Nov 2018 15:31:20 GMT Full Article headline flaw apache
it Facebook Vulnerable To Critical XSS, Could Lead To Malware Attacks By packetstormsecurity.com Published On :: Fri, 23 May 2008 08:26:21 GMT Full Article malware facebook xss
it Verisign, McAfee, And Symantec Sites Can Be Used For Phishing Due To XSS By packetstormsecurity.com Published On :: Mon, 09 Jun 2008 03:20:21 GMT Full Article verisign symantec phish mcafee xss
it Scripting Bugs Blight Security Giants' Websites By packetstormsecurity.com Published On :: Fri, 13 Jun 2008 03:15:52 GMT Full Article xss
it Yahoo Fixes Email Cross-Site Scripting Flaw By packetstormsecurity.com Published On :: Wed, 25 Jun 2008 18:27:02 GMT Full Article email flaw yahoo xss
it American Express Bitten By XSS Bugs Again By packetstormsecurity.com Published On :: Sat, 20 Dec 2008 08:30:00 GMT Full Article usa xss
it Attention Symantec - There Is A Bug Crawling On Your Website By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 10:59:55 GMT Full Article symantec xss
it Mozilla Tackles XSS Vulnerabilities With New Technology By packetstormsecurity.com Published On :: Mon, 22 Jun 2009 16:29:11 GMT Full Article mozilla xss
it MoD Website Outflanked By XSS Flaws By packetstormsecurity.com Published On :: Mon, 10 Aug 2009 02:30:05 GMT Full Article flaw xss
it RubyOnRails XSS Vulnerability Claims Twitter, Basecamp And My Confidence By packetstormsecurity.com Published On :: Thu, 03 Sep 2009 14:57:22 GMT Full Article xss twitter
it Reddit Swiftly Squishes XSS Worm By packetstormsecurity.com Published On :: Mon, 28 Sep 2009 04:42:36 GMT Full Article worm xss
it XSS Vulnerabilities In 8 Million Flash Files By packetstormsecurity.com Published On :: Tue, 22 Dec 2009 09:16:16 GMT Full Article adobe xss
it IE 8 XSS Filter Exposes Sites To XSS Attacks By packetstormsecurity.com Published On :: Mon, 19 Apr 2010 19:23:01 GMT Full Article microsoft xss
it Microsoft To Fix IE8 Cross-Site Scripting Problem, Again By packetstormsecurity.com Published On :: Tue, 20 Apr 2010 21:45:20 GMT Full Article microsoft xss
it Anti-Virus Vendor Trio Plug Website Flaws By packetstormsecurity.com Published On :: Mon, 04 Oct 2010 10:06:13 GMT Full Article virus flaw xss
it Patchy App Development Security Slammed By packetstormsecurity.com Published On :: Thu, 08 Dec 2011 16:29:13 GMT Full Article headline flaw xss csrf
it Abusing Password Managers With XSS By packetstormsecurity.com Published On :: Wed, 25 Apr 2012 19:00:23 GMT Full Article headline hacker flaw xss
it FreeBSD Security Advisory - FreeBSD-SA-18:13.nfs By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 18:04:28 GMT FreeBSD Security Advisory - Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server. Full Article
it FreeBSD Security Advisory - FreeBSD-SA-18:14.bhyve By packetstormsecurity.com Published On :: Thu, 06 Dec 2018 02:19:30 GMT FreeBSD Security Advisory - Insufficient bounds checking in one of the device models provided by bhyve(8) can permit a guest operating system to overwrite memory in the bhyve(8) processing possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root. Full Article
it FreeBSD Security Advisory - FreeBSD-SA-19:03.wpa By packetstormsecurity.com Published On :: Wed, 15 May 2019 15:30:08 GMT FreeBSD Security Advisory - Multiple vulnerabilities exist in the hostapd(8) and wpa_supplicant(8) implementations. Full Article