remote2.avsoft.ir Open in urlscan Pro
5.145.119.22  Public Scan

URL: https://remote2.avsoft.ir/
Submission: On August 11 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search/

<form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search …"><button type="submit"></button>
  <div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files"><input type="radio"
      value="news" name="s" id="s-news"><input type="radio" value="users" name="s" id="s-users"><input type="radio" value="authors" name="s" id="s-authors"></div>
</form>

GET /files/cal/

<form id="cal" action="/files/cal/" method="get">
  <h2>File Archive:</h2>
  <h3>August 2024</h3>
  <button id="cal-prev" name="cal-prev" type="button" value="2024-8"><span>&lt;</span></button>
  <ul class="dotw">
    <li>Su</li>
    <li>Mo</li>
    <li>Tu</li>
    <li>We</li>
    <li>Th</li>
    <li>Fr</li>
    <li>Sa</li>
  </ul>
  <ul>
    <li></li>
    <li></li>
    <li></li>
    <li></li>
    <li class="med"><a href="/files/date/2024-08-01/">1</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 1st</div>
        <div class="count">15 Files</div>
      </div>
    </li>
    <li class="med"><a href="/files/date/2024-08-02/">2</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 2nd</div>
        <div class="count">22 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-03/">3</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 3rd</div>
        <div class="count">0 Files</div>
      </div>
    </li>
  </ul>
  <ul>
    <li class="none"><a href="/files/date/2024-08-04/">4</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 4th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="med"><a href="/files/date/2024-08-05/">5</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 5th</div>
        <div class="count">15 Files</div>
      </div>
    </li>
    <li class="low"><a href="/files/date/2024-08-06/">6</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 6th</div>
        <div class="count">11 Files</div>
      </div>
    </li>
    <li class="med"><a href="/files/date/2024-08-07/">7</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 7th</div>
        <div class="count">43 Files</div>
      </div>
    </li>
    <li class="med"><a href="/files/date/2024-08-08/">8</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 8th</div>
        <div class="count">42 Files</div>
      </div>
    </li>
    <li class="med"><a href="/files/date/2024-08-09/">9</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 9th</div>
        <div class="count">36 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-10/">10</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 10th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
  </ul>
  <ul>
    <li class="none today"><a href="/files/date/2024-08-11/">11</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 11th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-12/">12</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 12th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-13/">13</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 13th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-14/">14</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 14th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-15/">15</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 15th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-16/">16</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 16th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-17/">17</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 17th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
  </ul>
  <ul>
    <li class="none"><a href="/files/date/2024-08-18/">18</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 18th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-19/">19</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 19th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-20/">20</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 20th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-21/">21</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 21st</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-22/">22</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 22nd</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-23/">23</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 23rd</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-24/">24</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 24th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
  </ul>
  <ul>
    <li class="none"><a href="/files/date/2024-08-25/">25</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 25th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-26/">26</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 26th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-27/">27</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 27th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-28/">28</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 28th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-29/">29</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 29th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-30/">30</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 30th</div>
        <div class="count">0 Files</div>
      </div>
    </li>
    <li class="none"><a href="/files/date/2024-08-31/">31</a>
      <div class="stats">
        <div class="point"></div>
        <div class="date">Aug 31st</div>
        <div class="count">0 Files</div>
      </div>
    </li>
  </ul>
</form>

Text Content

what you don't know can hurt you
Register | Login
FilesNewsUsersAuthors
Home Files News &[SERVICES_TAB]About Contact Add New

0.0.0.0 Day Browser Flaw Enables Malicious Requests To Local Networks SEC Takes
No Action On Progress MOVEit Transfer Case Paris Olympics Deal With Ransomware
Attack 512-bit RSA Key In Home System Gives Control Of Virtual Power Plant


RECENT FILES

 * All
 * Exploits
 * Advisories
 * Tools
 * Whitepapers
 * Other


Gentoo Linux Security Advisory 202408-19 Posted Aug 9, 2024 Authored by Gentoo |
Site security.gentoo.org

Gentoo Linux Security Advisory 202408-19 - Multiple vulnerabilities have been
discovered in ncurses, the worst of which could lead to a denial of service.
Versions greater than or equal to 6.4_p20230408 are affected.

tags | advisory, denial of service, vulnerability systems | linux, gentoo
Download | Favorite | View Debian Security Advisory 5746-1 Posted Aug 9, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5746-1 - Noah Misch discovered a race condition
in the pg_dump tool included in PostgreSQL, which may result in privilege
escalation.

tags | advisory systems | linux, debian Download | Favorite | View I2P 2.6.1
Posted Aug 9, 2024 Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
trusted parties. This is the source code release version.

Changes: Updates to Graphs and Translations. Fix a bug in i2ptunnel causing
truncation configuration UI. Translation updates. tags | tool systems | unix
Download | Favorite | View Gentoo Linux Security Advisory 202408-18 Posted Aug
9, 2024 Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202408-18 - Multiple vulnerabilities have been
discovered in QEMU, the worst of which could lead to a denial of service.
Versions greater than or equal to 8.0.0 are affected.

tags | advisory, denial of service, vulnerability systems | linux, gentoo
Download | Favorite | View Debian Security Advisory 5745-1 Posted Aug 9, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5745-1 - Noah Misch discovered a race condition
in the pg_dump tool included in PostgreSQL, which may result in privilege
escalation.

tags | advisory systems | linux, debian Download | Favorite | View Faraday 5.5.0
Posted Aug 9, 2024 Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated
Penetration-Test Environment. It is a multiuser penetration test IDE designed
for distribution, indexation and analysis of the generated data during the
process of a security audit. The main purpose of Faraday is to re-use the
available tools in the community to take advantage of them in a multiuser way.

Changes: Added Scheduler feature to community. Modified pytest launch parameters
to fail job at first error. Added Pipelines feature in community. tags | tool,
rootkit systems | unix Download | Favorite | View Gentoo Linux Security Advisory
202408-17 Posted Aug 9, 2024 Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202408-17 - A vulnerability has been discovered
in Nautilus, which can lead to a denial of service. Versions greater than or
equal to 44.0 are affected.

tags | advisory, denial of service systems | linux, gentoo Download | Favorite |
View Debian Security Advisory 5744-1 Posted Aug 9, 2024 Authored by Debian |
Site debian.org

Debian Linux Security Advisory 5744-1 - Multiple security issues were discovered
in Thunderbird, which could result in denial of service or the execution of
arbitrary code.

tags | advisory, denial of service, arbitrary systems | linux, debian Download |
Favorite | View Gentoo Linux Security Advisory 202408-16 Posted Aug 9, 2024
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202408-16 - A vulnerability has been discovered
in re2c, which can lead to a denial of service. Versions greater than or equal
to 2.0 are affected.

tags | advisory, denial of service systems | linux, gentoo Download | Favorite |
View Gentoo Linux Security Advisory 202408-15 Posted Aug 9, 2024 Authored by
Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202408-15 - Multiple vulnerabilities have been
discovered in Percona XtraBackup, the worst of which could lead to arbitrary
code execution. Versions greater than or equal to 8.0.29.22 are affected.

tags | advisory, arbitrary, vulnerability, code execution systems | linux,
gentoo Download | Favorite | View Gentoo Linux Security Advisory 202408-14
Posted Aug 9, 2024 Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202408-14 - A vulnerability has been discovered
in Librsvg, which can lead to arbitrary file reads. Versions greater than or
equal to 2.56.3 are affected.

tags | advisory, arbitrary systems | linux, gentoo Download | Favorite | View
Ubuntu Security Notice USN-6953-1 Posted Aug 9, 2024 Authored by Ubuntu | Site
security.ubuntu.com

Ubuntu Security Notice 6953-1 - Several security issues were discovered in the
Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, kernel systems | linux, ubuntu Download | Favorite | View
Ubuntu Security Notice USN-6952-1 Posted Aug 9, 2024 Authored by Ubuntu | Site
security.ubuntu.com

Ubuntu Security Notice 6952-1 - Benedict Schlüter, Supraja Sridhara, Andrin
Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject
malicious #VC interrupts and compromise the security guarantees of AMD SEV-SNP.
This flaw is known as WeSee. A local attacker in control of the hypervisor could
use this to expose sensitive information or possibly execute arbitrary code in
the trusted execution environment. Several security issues were discovered in
the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, arbitrary, kernel, local systems | linux, ubuntu Download |
Favorite | View Ubuntu Security Notice USN-6951-1 Posted Aug 9, 2024 Authored by
Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6951-1 - Several security issues were discovered in the
Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, kernel systems | linux, ubuntu Download | Favorite | View
Ubuntu Security Notice USN-6950-1 Posted Aug 9, 2024 Authored by Ubuntu | Site
security.ubuntu.com

Ubuntu Security Notice 6950-1 - Several security issues were discovered in the
Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, kernel systems | linux, ubuntu Download | Favorite | View Gaati
Track 1.0-2023 Insecure Direct Object Reference Posted Aug 9, 2024 Authored by
indoushka

Gaati Track version 1.0-2023 suffers from an insecure direct object reference
vulnerability.

tags | exploit Download | Favorite | View Red Hat Security Advisory 2024-5147-03
Posted Aug 9, 2024 Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5147-03 - An update is now available for Red Hat
JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated
this update as having a security impact of Important. A Common Vulnerability
Scoring System base score, which gives a detailed severity rating, is available
for each vulnerability from the CVE link in the References section. Issues
addressed include a denial of service vulnerability.

tags | advisory, denial of service systems | linux, redhat Download | Favorite |
View Ubuntu Security Notice USN-6949-1 Posted Aug 9, 2024 Authored by Ubuntu |
Site security.ubuntu.com

Ubuntu Security Notice 6949-1 - Several security issues were discovered in the
Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, kernel systems | linux, ubuntu Download | Favorite | View
Ubuntu Security Notice USN-6948-1 Posted Aug 9, 2024 Authored by Ubuntu | Site
security.ubuntu.com

Ubuntu Security Notice 6948-1 - It was discovered that Salt incorrectly handled
crafted web requests. A remote attacker could possibly use this issue to run
arbitrary commands. It was discovered that Salt incorrectly created certificates
with weak file permissions. It was discovered that Salt incorrectly handled
credential validation. A remote attacker could possibly use this issue to bypass
authentication.

tags | advisory, remote, web, arbitrary systems | linux, ubuntu Download |
Favorite | View Farmacia Gama 1.0 File Inclusion Posted Aug 9, 2024 Authored by
indoushka

Farmacia Gama version 1.0 suffers from a file inclusion vulnerability.

tags | exploit, code execution, file inclusion Download | Favorite | View Red
Hat Security Advisory 2024-5145-03 Posted Aug 9, 2024 Authored by Red Hat | Site
access.redhat.com

Red Hat Security Advisory 2024-5145-03 - An update is now available for Red Hat
JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9. Red
Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE link
in the References section. Issues addressed include a denial of service
vulnerability.

tags | advisory, denial of service systems | linux, redhat Download | Favorite |
View Employee Management System 1.0 Cross Site Request Forgery Posted Aug 9,
2024 Authored by indoushka

Employee Management System version 1.0 suffers from a cross site request forgery
vulnerability.

tags | exploit, csrf Download | Favorite | View Red Hat Security Advisory
2024-5144-03 Posted Aug 9, 2024 Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5144-03 - An update is now available for Red Hat
JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8. Red
Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE link
in the References section. Issues addressed include a denial of service
vulnerability.

tags | advisory, denial of service systems | linux, redhat Download | Favorite |
View Red Hat Security Advisory 2024-5143-03 Posted Aug 9, 2024 Authored by Red
Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5143-03 - An update is now available for Red Hat
JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7. Red
Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE link
in the References section. Issues addressed include a denial of service
vulnerability.

tags | advisory, denial of service systems | linux, redhat Download | Favorite |
View E-Commerce Site Using PHP PDO 1.0 Cross Site Scripting Posted Aug 9, 2024
Authored by indoushka

E-Commerce Site using PHP PDO version 1.0 suffers from a cross site scripting
vulnerability.

tags | exploit, php, xss Download | Favorite | View
View Older Files →

 * Follow us on Twitter
 * Follow us on Facebook
 * Subscribe to an RSS Feed


RECENT NEWS


FTX Ordered To Pay $12.7 Billion To Customers Posted Aug 9, 2024



tags | headline, fraud, cryptography Favorite | View CrowdStrike Dismisses
Claims Of Vulnerability In Falcon Sensor Bug Posted Aug 9, 2024



tags | headline, denial of service, flaw Favorite | View Pro-Iran Groups Lay
Groundwork For Chaos And Violence As US Election Meddling Intensifies Posted Aug
9, 2024



tags | headline, government, usa, cyberwar, iran Favorite | View A Deep Dive
Into CVE-2023-2163: How Google Found And Fixed An eBPF Linux Kernel
Vulnerability Posted Aug 8, 2024



tags | headline, hacker, linux, flaw, google Favorite | View Critical
Vulnerabilities In 6 AWS Services Disclosed At Black Hat USA Posted Aug 8, 2024



tags | headline, hacker, amazon, data loss, flaw, conference Favorite | View
Samsung Boosts Bug Bounty To A Cool Million For Cracks Of The Knox Vault
Subsystem Posted Aug 8, 2024



tags | headline, hacker, samsung Favorite | View Windows Update Flaws Allow
Undetectable Downgrade Attacks Posted Aug 8, 2024



tags | headline, microsoft, flaw Favorite | View Black Hat USA: Wi-Fi Tracking
Flaw Puts The BS In BSSID Posted Aug 8, 2024



tags | headline, wireless, flaw, conference Favorite | View US Elections Have
Never Been More Secure, Says CISA Chief Posted Aug 8, 2024



tags | headline, government, usa, conference Favorite | View US Offering $10
Million Reward For Iranian ICS Hackers Posted Aug 8, 2024



tags | headline, hacker, government, usa, cyberwar, iran, scada Favorite | View
View More News →


FILE ARCHIVE:


AUGUST 2024

<
 * Su
 * Mo
 * Tu
 * We
 * Th
 * Fr
 * Sa

 * 
 * 
 * 
 * 
 * 1
   Aug 1st
   15 Files
 * 2
   Aug 2nd
   22 Files
 * 3
   Aug 3rd
   0 Files

 * 4
   Aug 4th
   0 Files
 * 5
   Aug 5th
   15 Files
 * 6
   Aug 6th
   11 Files
 * 7
   Aug 7th
   43 Files
 * 8
   Aug 8th
   42 Files
 * 9
   Aug 9th
   36 Files
 * 10
   Aug 10th
   0 Files

 * 11
   Aug 11th
   0 Files
 * 12
   Aug 12th
   0 Files
 * 13
   Aug 13th
   0 Files
 * 14
   Aug 14th
   0 Files
 * 15
   Aug 15th
   0 Files
 * 16
   Aug 16th
   0 Files
 * 17
   Aug 17th
   0 Files

 * 18
   Aug 18th
   0 Files
 * 19
   Aug 19th
   0 Files
 * 20
   Aug 20th
   0 Files
 * 21
   Aug 21st
   0 Files
 * 22
   Aug 22nd
   0 Files
 * 23
   Aug 23rd
   0 Files
 * 24
   Aug 24th
   0 Files

 * 25
   Aug 25th
   0 Files
 * 26
   Aug 26th
   0 Files
 * 27
   Aug 27th
   0 Files
 * 28
   Aug 28th
   0 Files
 * 29
   Aug 29th
   0 Files
 * 30
   Aug 30th
   0 Files
 * 31
   Aug 31st
   0 Files


TOP AUTHORS IN LAST 30 DAYS

 * Red Hat 219 files
 * Ubuntu 85 files
 * indoushka 77 files
 * Jasper Nota 25 files
 * Gentoo 22 files
 * Debian 19 files
 * Willem Westerhof 19 files
 * Jim Blankendaal 11 files
 * Martijn Baalman 9 files
 * Apple 9 files


FILE TAGS

 * ActiveX (933)
 * Advisory (86,331)
 * Arbitrary (16,864)
 * BBS (2,859)
 * Bypass (1,861)
 * CGI (1,033)
 * Code Execution (7,801)
 * Conference (691)
 * Cracker (844)
 * CSRF (3,388)
 * DoS (25,066)
 * Encryption (2,389)
 * Exploit (53,171)
 * File Inclusion (4,262)
 * File Upload (994)
 * Firewall (822)
 * Info Disclosure (2,890)
 * Intrusion Detection (915)
 * Java (3,144)
 * JavaScript (896)
 * Kernel (7,201)
 * Local (14,794)
 * Magazine (586)
 * Overflow (13,169)
 * Perl (1,435)
 * PHP (5,224)
 * Proof of Concept (2,393)
 * Protocol (3,724)
 * Python (1,639)
 * Remote (31,650)
 * Root (3,635)
 * Rootkit (527)
 * Ruby (631)
 * Scanner (1,657)
 * Security Tool (8,027)
 * Shell (3,273)
 * Shellcode (1,217)
 * Sniffer (902)
 * Spoof (2,275)
 * SQL Injection (16,606)
 * TCP (2,441)
 * Trojan (690)
 * UDP (904)
 * Virus (669)
 * Vulnerability (32,956)
 * Web (9,963)
 * Whitepaper (3,782)
 * x86 (967)
 * XSS (18,250)
 * Other


FILE ARCHIVES

 * August 2024
 * July 2024
 * June 2024
 * May 2024
 * April 2024
 * March 2024
 * February 2024
 * January 2024
 * December 2023
 * November 2023
 * October 2023
 * September 2023
 * Older


SYSTEMS

 * AIX (429)
 * Apple (2,099)
 * BSD (377)
 * CentOS (58)
 * Cisco (1,927)
 * Debian (7,096)
 * Fedora (1,693)
 * FreeBSD (1,246)
 * Gentoo (4,553)
 * HPUX (880)
 * iOS (378)
 * iPhone (108)
 * IRIX (220)
 * Juniper (69)
 * Linux (50,689)
 * Mac OS X (691)
 * Mandriva (3,105)
 * NetBSD (256)
 * OpenBSD (489)
 * RedHat (16,482)
 * Slackware (941)
 * Solaris (1,611)
 * SUSE (1,444)
 * Ubuntu (9,736)
 * UNIX (9,435)
 * UnixWare (187)
 * Windows (6,671)
 * Other


NEWS TAGS

 * 0 Day (299)
 * Adobe (310)
 * Anonymous (350)
 * Apple (1,064)
 * Backdoor (702)
 * Bank (1,207)
 * Botnet (579)
 * Britain (1,106)
 * China (940)
 * Cisco (208)
 * Conference (325)
 * Cryptography (1,604)
 * Cybercrime (2,106)
 * Cyberwar (1,923)
 * Data Loss (3,941)
 * Database (227)
 * DoS (548)
 * Email (517)
 * Facebook (829)
 * FBI (455)
 * Flaw (4,501)
 * Fraud (2,666)
 * Google (1,560)
 * Government (6,960)
 * Hacker (7,539)
 * Headline (19,774)
 * Identity Theft (211)
 * Iran (222)
 * Linux (261)
 * Malware (2,725)
 * Microsoft (1,822)
 * Military (219)
 * Mozilla (216)
 * NSA (678)
 * Password (775)
 * Patch (1,003)
 * Phish (373)
 * Phone (1,925)
 * Privacy (4,758)
 * Russia (1,061)
 * Scada (206)
 * Scam (273)
 * Science (534)
 * Social (467)
 * Space (256)
 * Spam (379)
 * Spyware (1,593)
 * Terror (402)
 * Trojan (321)
 * Twitter (402)
 * USA (3,884)
 * Virus (397)
 * Wireless (228)
 * Worm (201)
 * Other


NEWS ARCHIVES

 * August 2024
 * July 2024
 * June 2024
 * May 2024
 * April 2024
 * March 2024
 * February 2024
 * January 2024
 * December 2023
 * November 2023
 * October 2023
 * September 2023
 * Older

© 2022 Packet Storm. All rights reserved.

Site Links News by Month News Tags Files by Month File Tags File Directory
About Us History & Purpose Contact Information Terms of Service Privacy
Statement Copyright Information
Services Security Services Hosting By Rokasec
 * Follow us on Twitter
 * Follow us on Facebook
 * Subscribe to an RSS Feed