what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2002-12-25

html-trap.procmail.gz
Posted Dec 25, 2002
Authored by John Hardin

Email Security through Procmail 1.137 - Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

Changes: A bug in filename shortening that broke older Perl versions has been fixed. MIME mangling has been changed away from TEXT/PLAIN, as some mailers perform text-related operations on that MIME type, corrupting the attachments.
tags | worm, trojan
systems | unix
SHA-256 | 5835b37fa391d7f8b9c86f8d02e7ae80e677ffe9aa99a75bb00380be8f5fb085
visnetic.dos.txt
Posted Dec 25, 2002
Authored by Peter Kruse | Site krusesecurity.dk

The VisNetic WebSite Server for Windows v3.5.13.1 and below contains a remote denial of service vulnerability which can be exploited by sending a 5000 character URL.

tags | advisory, remote, denial of service
systems | windows
SHA-256 | 3c584629b51d943bbf04163d06512c711249ee635d947585e6b48ef586d7e361
ftp.client.traversal.txt
Posted Dec 25, 2002
Authored by Steven M. Christey

FTP clients, including those that may be embedded in web clients, can be vulnerable to certain directory traversal attacks by modified FTP servers. If successful, the attacks could allow the server to overwrite or create arbitrary files outside of the client's working directory, subject to file/directory permissions and the privilege level of the client. Vulnerable clients include wget-1.8.1, OpenBSD 3.0 ftp, and Solaris 2.7 and 2.7 ftp.

tags | advisory, web, arbitrary
systems | solaris, openbsd
SHA-256 | e04b3f39784fb43911484c74fae121e90aac99afd0985873bce51157ed79afb2
CORE-20021005.txt
Posted Dec 25, 2002
Authored by Core Security Technologies | Site corest.com

CORE Security Advisory CORE-20020528 - Remotely exploitable Buffer overflows and Authentication bypass bugs were found on the Linksys BEFW11S4 Wireless router and other devices. Tested against Linksys BEFW11S4, BEFSR41, BEFSR11, BEFSRU31, BEFSR81, BEFN2PS4, and BEFVP41. Includes exploit information.

tags | overflow
SHA-256 | 1b1c0be0a7f7d1da1fdec59acc0f6affc05ddea2d39f38d573b76c54accf1c30
uspoof.zip
Posted Dec 25, 2002
Authored by r-22 | Site manshadow.org

This program allows you to send Net Send and Winpopup messages to a machine and make it look like it came from any name that you want. It uses API calls to write directly to the \\mailslot\ resource. Visual Basic source code provided.

SHA-256 | a3831658cb443957b4dd218329334cd6af9e0df5d238c6b7df4b93f546ea0fb0
12.16.02b.txt
Posted Dec 25, 2002
Authored by Blink

iDEFENSE Security Advisory 12.16.02b - The Melange chat server v1.10 and blow has a remotely exploitable buffer overflow.

tags | advisory, overflow
SHA-256 | 35a79f4872f06a1b867013ada8d7bb62b3fb09aa02b2a772292fb1694b36d7b6
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close