4 Red Hat Security Advisory 2020-1045-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:15:59 GMT Red Hat Security Advisory 2020-1045-01 - LFTP is a file transfer utility for File Transfer Protocol, Secure File Transfer Protocol, Hypertext Transfer Protocol, and other commonly used protocols. It uses the readline library for input, and provides support for bookmarks, built-in monitoring, job control, and parallel transfer of multiple files at the same time. Full Article
4 Gentoo Linux Security Advisory 202004-06 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:51:49 GMT Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected. Full Article
4 Red Hat Security Advisory 2020-1334-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:58:34 GMT Red Hat Security Advisory 2020-1334-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. An arbitrary code execution vulnerability was addressed. Full Article
4 Red Hat Security Advisory 2020-1342-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:40:28 GMT Red Hat Security Advisory 2020-1342-01 - Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default. Issues addressed include a code execution vulnerability. Full Article
4 Red Hat Security Advisory 2020-1445-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:39:41 GMT Red Hat Security Advisory 2020-1445-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include cross site scripting, denial of service, and information leakage vulnerabilities. Full Article
4 Red Hat Security Advisory 2020-1470-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:09:22 GMT Red Hat Security Advisory 2020-1470-01 - The Network Time Protocol is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. Issues addressed include buffer overflow, code execution, and denial of service vulnerabilities. Full Article
4 Red Hat Security Advisory 2020-1840-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:18:54 GMT Red Hat Security Advisory 2020-1840-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include an information leakage vulnerability. Full Article
4 Red Hat Security Advisory 2020-1845-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:34:31 GMT Red Hat Security Advisory 2020-1845-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Full Article
4 Rootkit Hunter 1.4.6 By packetstormsecurity.com Published On :: Mon, 19 Feb 2018 23:44:44 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
4 Faraday 3.0b4 By packetstormsecurity.com Published On :: Tue, 03 Jul 2018 20:22:22 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
4 Faraday 3.4 By packetstormsecurity.com Published On :: Tue, 11 Dec 2018 16:26:30 GMT Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way. Full Article
4 Macs Framework 1.14f Cross Site Scripting / SQL Injection By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:33:28 GMT Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities. Full Article
4 Complaint Management System 4.2 SQL Injection By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:29:20 GMT Complaint Management System version 4.2 suffers a remote SQL injection vulnerability that allows for authentication bypass. Full Article
4 YesWiki cercopitheque 2020.04.18.1 SQL Injection By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:44:02 GMT YesWiki cercopitheque version 2020.04.18.1 suffers from a remote SQL injection vulnerability. Full Article
4 Hashcat Advanced Password Recovery 4.0.0 Binary Release By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:09 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.. Full Article
4 Hashcat Advanced Password Recovery 4.0.0 Source Code By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:15 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
4 Hashcat Advanced Password Recovery 4.0.1 Binary Release By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:17 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
4 Hashcat Advanced Password Recovery 4.0.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:23 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
4 Hashcat Advanced Password Recovery 4.1.0 Binary Release By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 14:04:20 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
4 Hashcat Advanced Password Recovery 4.1.0 Source Code By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 14:04:26 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
4 RC4 Simple FILE Encryption / Decryption By packetstormsecurity.com Published On :: Thu, 05 Apr 2018 20:20:02 GMT Simple script to perform RC4 encryption / decryption. Full Article
4 Hashcat Advanced Password Recovery 4.2.0 Binary Release By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:29:09 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
4 Hashcat Advanced Password Recovery 4.2.0 Source Code By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:31:24 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
4 Hashcat Advanced Password Recovery 4.2.1 Binary Release By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:55:55 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
4 Hashcat Advanced Password Recovery 4.2.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:56:22 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
4 Coronavirus Lockdowns: 24 Hours Of Confusion Around The World By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:49 GMT Full Article headline government virus science
4 FreeBSD 4.3-RELEASE Released By packetstormsecurity.com Published On :: Tue, 24 Apr 2001 04:36:51 GMT Full Article bsd
4 FreeBSD 4.4 Released By packetstormsecurity.com Published On :: Thu, 20 Sep 2001 13:52:56 GMT Full Article bsd
4 FreeBSD 4.5 Released By packetstormsecurity.com Published On :: Wed, 30 Jan 2002 21:42:28 GMT Full Article bsd
4 FreeBSD 4.6 Released By packetstormsecurity.com Published On :: Mon, 17 Jun 2002 07:20:30 GMT Full Article bsd
4 Clam AntiVirus Toolkit 0.101.4 By packetstormsecurity.com Published On :: Wed, 21 Aug 2019 20:08:12 GMT Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. Full Article
4 Max Secure Anti Virus Plus 19.0.4.020 Insecure Permissions By packetstormsecurity.com Published On :: Sat, 30 Nov 2019 22:42:30 GMT Max Secure Anti Virus Plus version 19.0.4.020 suffers from an insecure permission vulnerability. Full Article
4 Apple iPhone 4 Passphrase Disclosure By packetstormsecurity.com Published On :: Mon, 07 Mar 2011 15:58:33 GMT Apple iPhone 4 with iOS 4.3 (8F190) suffers from a passphrase disclosure vulnerability that allows all local processes access to it. Full Article
4 Secunia Security Advisory 43832 By packetstormsecurity.com Published On :: Thu, 24 Mar 2011 08:52:53 GMT Secunia Security Advisory - A vulnerability has been reported in Apple iPhone iOS, which can be exploited by malicious people to compromise a vulnerable device. Full Article
4 Secunia Security Advisory 44154 By packetstormsecurity.com Published On :: Sun, 17 Apr 2011 06:25:13 GMT Secunia Security Advisory - Some vulnerabilities has been reported in Apple iOS for iPhone 4 (CDMA), which can be exploited by malicious people to compromise a vulnerable device. Full Article
4 Shanghai Jiao Tong University Exposed 8.4TB Of Email Data By packetstormsecurity.com Published On :: Mon, 10 Jun 2019 19:57:39 GMT Full Article headline privacy email china data loss
4 Red Hat Security Advisory 2020-1624-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:37:45 GMT Red Hat Security Advisory 2020-1624-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include buffer overflow, information leakage, integer overflow, and out of bounds read vulnerabilities. Full Article
4 SQLMAP - Automatic SQL Injection Tool 1.4.5 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:30:13 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
4 Red Hat Security Advisory 2020-2041-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:51:23 GMT Red Hat Security Advisory 2020-2041-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
4 Red Hat Security Advisory 2020-2040-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:54:10 GMT Red Hat Security Advisory 2020-2040-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
4 Red Hat Security Advisory 2020-0431-01 By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:50:02 GMT Red Hat Security Advisory 2020-0431-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
4 Ubuntu Security Notice USN-4294-1 By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 19:16:40 GMT Ubuntu Security Notice 4294-1 - It was discovered that OpenSMTPD mishandled certain input. A remote, unauthenticated attacker could use this vulnerability to execute arbitrary shell commands as any non-root user. It was discovered that OpenSMTPD did not properly handle hardlinks under certain conditions. An unprivileged local attacker could read the first line of any file on the filesystem. Full Article
4 Researchers Find Security Flaws In 40 Kernel Drivers From 20 Vendors By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:44 GMT Full Article headline linux flaw conference
4 Bluefog 0.0.4 By packetstormsecurity.com Published On :: Tue, 12 Feb 2013 04:06:07 GMT Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously. Full Article
4 HWK Wireless Auditing Tool 0.4 By packetstormsecurity.com Published On :: Fri, 18 Oct 2013 01:30:01 GMT hwk is an easy-to-use wireless authentication and de-authentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types. Full Article
4 Aircrack-ng Wireless Network Tools 1.2 RC4 By packetstormsecurity.com Published On :: Tue, 16 Feb 2016 17:29:48 GMT aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.). Full Article
4 Aircrack-ng Wireless Network Tools 1.4 By packetstormsecurity.com Published On :: Mon, 01 Oct 2018 17:53:31 GMT aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.). Full Article
4 Sierra Wireless AirLink ES450 ACEManager iplogging.cgi Command Injection By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 19:32:22 GMT An exploitable command injection vulnerability exists in the ACEManager iplogging.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can inject arbitrary commands, resulting in arbitrary command execution. An attacker can send an authenticated HTTP request to trigger this vulnerability. Full Article
4 Sierra Wireless AirLink ES450 ACEManager upload.cgi Unverified Password Change By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 20:32:22 GMT An exploitable unverified password change vulnerability exists in the ACEManager upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a unverified device configuration change, resulting in an unverified change of the user password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
4 Sierra Wireless AirLink ES450 ACEManager ping_result.cgi Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 21:01:11 GMT An exploitable cross-site scripting vulnerability exists in the ACEManager ping_result.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP ping request can cause reflected javascript code execution, resulting in the execution of javascript code running on the victim's browser. An attacker can get a victim to click a link, or embedded URL, that redirects to the reflected cross-site scripting vulnerability to trigger this vulnerability. Full Article