2 MDKSA-2004:140.txt By packetstormsecurity.com Published On :: Sat, 11 Dec 2004 21:55:02 GMT Mandrake Linux Security Update Advisory - The GNU a2ps utility fails to properly sanitize filenames, which can be abused by a malicious user to execute arbitrary commands with the privileges of the user running the vulnerable application. Full Article
2 Mandriva Linux Security Advisory 2004.146 By packetstormsecurity.com Published On :: Sun, 12 Dec 2004 18:24:27 GMT Mandrake Linux Security Update Advisory - SGI developers discovered a remote DoS (Denial of Service) condition in the NFS statd server. rpc.statd did not ignore the SIGPIPE signal which would cause it to shutdown if a misconfigured or malicious peer terminated the TCP connection prematurely. Full Article
2 Mandriva Linux Security Advisory 2004.148 By packetstormsecurity.com Published On :: Thu, 30 Dec 2004 06:59:44 GMT Mandrake Linux Security Update Advisory - Herbert Xu discovered that iproute can accept spoofed messages sent via the kernel netlink interface by other users on the local machine. This could lead to a local Denial of Service attack. Full Article
2 Bastille-2.1.7.tar.bz2 By packetstormsecurity.com Published On :: Tue, 25 Jan 2005 08:06:52 GMT The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here.. Full Article
2 Mandriva Linux Security Advisory 2005.029 By packetstormsecurity.com Published On :: Sat, 05 Feb 2005 20:49:38 GMT Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts. Full Article
2 Bastille-2.2.5.tar.bz2 By packetstormsecurity.com Published On :: Tue, 22 Mar 2005 16:01:09 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
2 Bastille-2.2.8-1.0.noarch.rpm By packetstormsecurity.com Published On :: Sat, 26 Mar 2005 03:15:46 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
2 Bastille Unix 3.2.1 By packetstormsecurity.com Published On :: Sun, 29 Jan 2012 11:11:10 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Full Article
2 How Hackers Pulled Off A $20 Million Bank Heist By packetstormsecurity.com Published On :: Mon, 18 Mar 2019 14:48:17 GMT Full Article headline hacker bank cybercrime korea mexico
2 Technical Cyber Security Alert 2007-59A By packetstormsecurity.com Published On :: Tue, 06 Mar 2007 04:37:19 GMT Technical Cyber Security Alert TA07-059A - A worm is exploiting a vulnerability in the telnet daemon (in.telnetd) on unpatched Sun Solaris systems. The vulnerability allows the worm (or any attacker) to log in via telnet (23/tcp) with elevated privileges. Full Article
2 ACM-CFP2007.txt By packetstormsecurity.com Published On :: Wed, 20 Jun 2007 05:02:32 GMT The 5th ACM Workshop On Recurring Malcode (WORM) 2007 Call For Papers has been announced. It will be held on November 2, 2007 in Alexandria, VA, USA. Full Article
2 Exploit Web 2.0, Real Life XSS-Worm By packetstormsecurity.com Published On :: Thu, 05 Feb 2009 22:08:04 GMT Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm. Full Article
2 Technical Cyber Security Alert 2009-88A By packetstormsecurity.com Published On :: Mon, 30 Mar 2009 19:50:26 GMT Technical Cyber Security Alert TA09-088A - US-CERT is aware of public reports indicating a widespread infection of the Conficker worm, which can infect a Microsoft Windows system from a thumb drive, a network share, or directly across a network if the host is not patched with MS08-067. Full Article
2 Hak5 WiFi Pineapple Preconfiguration Command Injection 2 By packetstormsecurity.com Published On :: Wed, 19 Oct 2016 01:02:21 GMT This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm. Full Article
2 Linux Security Checklist Tool 2.0.3 By packetstormsecurity.com Published On :: Thu, 03 Feb 2011 15:31:32 GMT Linux Security Checklist is a perl script that audits a given Linux host and provides recommendations for security enhancements. Full Article
2 CA-92:04.ATT.rexecd.vulnerability By packetstormsecurity.com Published On :: Tue, 14 Sep 1999 05:47:01 GMT A vulnerability is present in AT&T TCP/IP Release 4.0 running on SVR4 systems for both the 386/486 and 3B2 RISC platforms. The problem is in the remote execution server /usr/etc/rexecd and a new version of rexecd is available from AT&T. Full Article
2 HP Security Bulletin 2007-14.84 By packetstormsecurity.com Published On :: Thu, 08 Nov 2007 23:36:19 GMT HP Security Bulletin - A potential security vulnerability has been identified in the Aries PA-RISC emulation software running on HP-UX IA-64 platforms only. This vulnerability may allow local unauthorized access. Full Article
2 john-1.7.2.tar.gz By packetstormsecurity.com Published On :: Mon, 05 Jun 2006 03:03:35 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
2 john-1.7.4.2.tar.gz By packetstormsecurity.com Published On :: Thu, 04 Feb 2010 04:33:25 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
2 John The Ripper 1.7.6 Jumbo 12 By packetstormsecurity.com Published On :: Wed, 16 Feb 2011 19:22:11 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
2 John The Ripper 1.7.8 Jumbo 2 By packetstormsecurity.com Published On :: Tue, 05 Jul 2011 00:27:53 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
2 wdial20.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
2 ward2.c By packetstormsecurity.com Published On :: Tue, 23 Dec 2003 09:29:18 GMT WARD v2.0 is a classic war dialer - it scans a list of phone numbers, finding the ones where a modem is answering the call. WARD can generate phone number lists based on a user-supplied mask, in incremental or random order. Remember to change some defines to make it fit your current system configuration. WARD is one of the fastest PBX scanners around (and possibly the best for UNIX environments). Tested on OpenBSD, Linux, and Windows under Cygwin. Full Article
2 Tenshi Log Monitoring Program 0.12 By packetstormsecurity.com Published On :: Sat, 18 Sep 2010 19:43:42 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
2 NIELD (Network Interface Events Logging Daemon) 0.20 By packetstormsecurity.com Published On :: Wed, 17 Aug 2011 14:31:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
2 NIELD (Network Interface Events Logging Daemon) 0.21 By packetstormsecurity.com Published On :: Tue, 27 Dec 2011 17:28:33 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
2 NIELD (Network Interface Events Logging Daemon) 0.22 By packetstormsecurity.com Published On :: Fri, 10 Feb 2012 22:31:56 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
2 NIELD (Network Interface Events Logging Daemon) 0.23 By packetstormsecurity.com Published On :: Wed, 11 Apr 2012 15:17:25 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
2 ZedLog 0.2 Beta By packetstormsecurity.com Published On :: Tue, 14 May 2013 03:46:57 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
2 ZedLog 0.2 Beta 2 By packetstormsecurity.com Published On :: Fri, 12 Jul 2013 18:23:22 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
2 ZedLog 0.2 Beta 3 By packetstormsecurity.com Published On :: Mon, 15 Jul 2013 10:33:33 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
2 ZedLog 0.2 Beta 4 By packetstormsecurity.com Published On :: Tue, 20 Aug 2013 17:55:55 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
2 Feds Bust Man Selling $1.2m In Counterfeit Microsoft Software By packetstormsecurity.com Published On :: Sat, 10 Nov 2012 02:52:47 GMT Full Article headline microsoft cybercrime fraud ebay
2 SHA-2 Takes Off, Thanks To Heartbleed By packetstormsecurity.com Published On :: Wed, 07 May 2014 14:45:26 GMT Full Article headline flaw ssl cryptography
2 Secunia Security Advisory 52008 By packetstormsecurity.com Published On :: Mon, 28 Jan 2013 06:24:14 GMT Secunia Security Advisory - SUSE has issued an update for java-1_7_0-openjdk. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Article
2 Secunia Security Advisory 52039 By packetstormsecurity.com Published On :: Mon, 04 Feb 2013 04:57:58 GMT Secunia Security Advisory - SUSE has issued an update for chromium. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. Full Article
2 Secunia Security Advisory 52044 By packetstormsecurity.com Published On :: Mon, 04 Feb 2013 06:43:18 GMT Secunia Security Advisory - SUSE has issued an update for virtualbox. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Article
2 Secunia Security Advisory 52124 By packetstormsecurity.com Published On :: Thu, 07 Feb 2013 06:50:11 GMT Secunia Security Advisory - SUSE has issued an update for libupnp. This fixes three vulnerabilities, which can be exploited by malicious people to compromise an application using the library. Full Article
2 Secunia Security Advisory 52111 By packetstormsecurity.com Published On :: Thu, 07 Feb 2013 07:09:56 GMT Secunia Security Advisory - SUSE has issued an update for apache2. This fixes two weaknesses, a security issue, and a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks. Full Article
2 Secunia Security Advisory 52113 By packetstormsecurity.com Published On :: Thu, 07 Feb 2013 07:10:02 GMT Secunia Security Advisory - SUSE has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
2 Secunia Security Advisory 52049 By packetstormsecurity.com Published On :: Thu, 07 Feb 2013 07:10:05 GMT Secunia Security Advisory - SUSE has issued an update for v8. This fixes two vulnerabilities, which can be exploited by malicious people to compromise an application using the library. Full Article
2 Secunia Security Advisory 52160 By packetstormsecurity.com Published On :: Mon, 11 Feb 2013 06:47:27 GMT Secunia Security Advisory - SUSE has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Article
2 Secunia Security Advisory 52159 By packetstormsecurity.com Published On :: Mon, 11 Feb 2013 06:47:31 GMT Secunia Security Advisory - SUSE has issued an update for MySQL. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct brute force attacks. Full Article
2 Secunia Security Advisory 52148 By packetstormsecurity.com Published On :: Tue, 12 Feb 2013 06:40:05 GMT Secunia Security Advisory - SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to potentially cause a DoS (Denial of Service) in an application using the library. Full Article
2 Secunia Security Advisory 52150 By packetstormsecurity.com Published On :: Tue, 12 Feb 2013 06:40:42 GMT Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system. Full Article
2 Secunia Security Advisory 52204 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 04:59:55 GMT Secunia Security Advisory - SUSE has issued an update for opera. This fixes a vulnerability with an unknown impact. Full Article
2 Secunia Security Advisory 52151 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 10:56:01 GMT Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Article
2 Secunia Security Advisory 52152 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 10:56:14 GMT Secunia Security Advisory - SUSE has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Article
2 Secunia Security Advisory 52077 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 11:12:18 GMT Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. Full Article
2 Secunia Security Advisory 52135 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 11:12:21 GMT Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to conduct clickjacking attacks. Full Article