exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files Date: 2021-04-12

Falco 0.28.0
Posted Apr 12, 2021
Authored by Sysdig | Site sysdig.org

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Breaking changes include a deprecation of Bintray, SKIP_MODULE_LOAD env variable no more disables the driver loading, and the init.d service unit is not shipped anymore in deb/rpm packages in favor of a systemd service file. Various new additions including support for exceptions as rule attributes to provide a compact way to add exceptions to Falco rules.
tags | tool, intrusion detection
systems | unix
SHA-256 | 1fa9c05e461817aa2542efa3b5e28e51a6caf02935dfc9d47271af79d5414947
Ubuntu Security Notice USN-4899-2
Posted Apr 12, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4899-2 - USN-4899-1 fixed a vulnerability in SpamAssassin. This update provides the corresponding update for Ubuntu 14.04 ESM. Damian Lukowski discovered that SpamAssassin incorrectly handled certain CF files. If a user or automated system were tricked into using a specially- crafted CF file, a remote attacker could possibly run arbitrary code. Various other issues were also addressed.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-1946
SHA-256 | e9b992829524fe48be94507171d6a8be14b8bd6ec5c973be136bfb56cfd6fd56
ZeroNights 2021 Call For Papers
Posted Apr 12, 2021
Authored by ZeroNights CFP | Site zeronights.org

The ZeroNights 2021 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia on June 30th, 2021.

tags | paper, conference
SHA-256 | 418b437944405587fb3fa6770e284fea10b92a3aabcbc643723779fa7611dd42
vsftpd 2.3.4 Backdoor Command Execution
Posted Apr 12, 2021
Authored by HerculesRD

vsftpd version 2.3.4 backdoor remote command execution exploit.

tags | exploit, remote
advisories | CVE-2011-2523
SHA-256 | c0ee2bac855dfafeabb54e7bd1857abc123cf6d6f29f770b1d71d6f170376957
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close