Email Security through Procmail 1.137 - Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.
5835b37fa391d7f8b9c86f8d02e7ae80e677ffe9aa99a75bb00380be8f5fb085
The VisNetic WebSite Server for Windows v3.5.13.1 and below contains a remote denial of service vulnerability which can be exploited by sending a 5000 character URL.
3c584629b51d943bbf04163d06512c711249ee635d947585e6b48ef586d7e361
FTP clients, including those that may be embedded in web clients, can be vulnerable to certain directory traversal attacks by modified FTP servers. If successful, the attacks could allow the server to overwrite or create arbitrary files outside of the client's working directory, subject to file/directory permissions and the privilege level of the client. Vulnerable clients include wget-1.8.1, OpenBSD 3.0 ftp, and Solaris 2.7 and 2.7 ftp.
e04b3f39784fb43911484c74fae121e90aac99afd0985873bce51157ed79afb2
CORE Security Advisory CORE-20020528 - Remotely exploitable Buffer overflows and Authentication bypass bugs were found on the Linksys BEFW11S4 Wireless router and other devices. Tested against Linksys BEFW11S4, BEFSR41, BEFSR11, BEFSRU31, BEFSR81, BEFN2PS4, and BEFVP41. Includes exploit information.
1b1c0be0a7f7d1da1fdec59acc0f6affc05ddea2d39f38d573b76c54accf1c30
This program allows you to send Net Send and Winpopup messages to a machine and make it look like it came from any name that you want. It uses API calls to write directly to the \\mailslot\ resource. Visual Basic source code provided.
a3831658cb443957b4dd218329334cd6af9e0df5d238c6b7df4b93f546ea0fb0
iDEFENSE Security Advisory 12.16.02b - The Melange chat server v1.10 and blow has a remotely exploitable buffer overflow.
35a79f4872f06a1b867013ada8d7bb62b3fb09aa02b2a772292fb1694b36d7b6