Server Software and Configuration Services
New cxs v1.04
Changes: Fixed duplicate virus scan on script files with regex matches Exploit fingerprint definitions database additions
Changes: Fixed duplicate virus scan on script files with regex matches Exploit fingerprint definitions database additions
Changes: Added quotes around the $1 parameter in cxscgi.sh and cxsftp.sh to cope with files with spaces in their names. Existing scripts will be fixed on upgrade
Changes: Removed the need for UI lfd cron restart jobs on Direct Admin
Changes: Added initial FreeBSD (v7.2) support – currently no UI cron job support has been implemented, jobs will have to be added to /etc/crontab manually on FreeBSD Fixed UI quarantine restore to always use correct uid and gid Updated exploit…
Changes: Added new exploit scanning option M to be used with –option (enabled by default) and –voption. The M option scans a fingerprint lookup table of over 4500 known exploit scripts. If you cron jobs or have modified cxsftp.sh or…
Changes: Fixed case sensitivity issue introduced in v4.80 with port specific lfd deny lines being ignored
Changes: Modified WHM login regex to only trap successful root page displays for LF_CPANEL_ALERT Apache status for PT_LOAD now checks on GENERIC/DA servers. You need to ensure that the server-status page has access from 127.0.0.1 in the apache server-status…
This version has been withdrawn. Please upgrade to v4.80
We’re currently offering cxs for free as part of our cPanel Service Package.Our new product is proving popular amongst web hosting providers concerned about exploits being uploaded to client sites affecting not only their account, but all accounts on the…
Changes: Moved mailwatch from:/usr/local/cpanel/whostmgr/docroot/3rdparty/mailwatchto:/usr/local/cpanel/whostmgr/docroot/cgi/mailwatch Made mailwatch cPanel 11.25 Security Token aware Added new option “MailScanner Update Rules” to front-end which will force an update of the MailScanner rules with end-user settings “Access Mailwatch” will now launch into the _blank target…