exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files Date: 2002-05-16

flawfinder-0.22.tar.gz
Posted May 16, 2002
Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Updated the report given about having %s in scanf when a limit for %s was provided.
systems | unix
SHA-256 | 1303fe146d980871fbbb9a3977338f4f426e10e1cd35fbd9cd8bb88dd1326246
execdeny.tar.gz
Posted May 16, 2002
Site netbsd.ro

Exec Denier is a kernel module for NetBSD that restricts exec syscalls for certain UIDs. It is very useful for blocking exec calls for named and ntpd. It can also restrict exec calls for users to a certain directory. Changelog available here.

Changes: Supports allowing/denying PROT_EXEC nmap calls on certain files, and cleanups to previously written code.
tags | kernel
systems | netbsd, unix
SHA-256 | 816dab99545116044312de51e57697d14c66c992ce590f81b6e8a869ce6115ae
SmS-1.2.tar.gz
Posted May 16, 2002
Authored by Pir8 | Site dtors.net

Sms.c allows you to control any unix server via mobile phone, two way pager, or email.

systems | unix
SHA-256 | 558d302d5d92ab6b9af8f527507419ba6ec3a6780578cceb0207bfe44d4a8571
ms02-023
Posted May 16, 2002

Microsoft Security Advisory MS02-023 - Six new serious vulnerabilities were discovered in Internet Explorer 5.01, 5.5, and 6.0. Some allow malicious web sites or HTML email to execute code, while others disclose information or allow malformed executables on a web page to download and run on the users system. Microsoft patch available here.

tags | web, vulnerability
SHA-256 | 7b147f778fa5f76ed2a9b82c5714bdf381438322a2a03688726bcb9480e64611
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close