what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-03-05

mimedefang-2.40.tar.gz
Posted Mar 5, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: If multiple virus scanners are installed, they are all used. Default action for viruses (in the sample filter) is now discard. Added a new notification facility to allow external software to react to changes in multiplexor state. It now passes both the raw input message and the unpacked, decoded parts to the virus scanner making virus detection much more reliable.
systems | windows, unix
SHA-256 | 16d2bcdac52634580263e0b9c4e716bb910c40de0c1423bdffcab294547aa8cb
hgmcrash.zip
Posted Mar 5, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Haegemonia version 1.07 and below denial of service exploit. Updated to support the other games from Desert Rats that are not even released yet but hold the same vulnerability.

tags | exploit, denial of service
SHA-256 | e6a331c593c7fe0a0312e639ccf14bdb041134985719b0f7680d0a645160c8ec
invision13.txt
Posted Mar 5, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Invision Power Board versions 1.3 Final is susceptible to a cross site scripting attack.

tags | exploit, xss
SHA-256 | 93d8939b30b06bd6edcf59474442458101779057deb1b80413667302d3c4d1bf
virtuanews103.txt
Posted Mar 5, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

VirtuaNews Admin Panel version 1.0.3 Pro is vulnerable to a cross site scripting attack.

tags | exploit, xss
SHA-256 | 205786c68330b41eb6b26b19658148764eb7d43fc3a1175dc049219bdcbb8f1b
slmailwm.txt
Posted Mar 5, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR05022004b - SLWebMail has multiple buffer overflow vulnerabilities that are related to ISAPI appliactions.

tags | advisory, overflow, vulnerability
SHA-256 | 790511422fd37d4dce237d9ab6d5bcca33b01748ee585626ae4f96d6e9de7c25
slmailsrc.txt
Posted Mar 5, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR05022004a - SLMail Pro Supervisor Report Center versions 2.0.9 and below are vulnerable to a buffer overflow attack when supplied with an overly long HTTP sub-version.

tags | advisory, web, overflow
SHA-256 | bbf99c5e556389172e13039eabaf73dc04ef299f0efb85553c10a6ffac15cee4
rfcbof.zip
Posted Mar 5, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Exploit for Red Faction versions 1.20 and below that have a client-side buffer overflow.

tags | exploit, overflow
SHA-256 | 01c7b9282fc2aa240cbc56fcdaaa2305670964794ae290b72a06e4e3f1e60a0c
prismstumbler-0.7.0.tar.gz
Posted Mar 5, 2004
Authored by Florian Boor | Site prismstumbler.sourceforge.net

Prismstumbler is software which finds 802.11 (W-LAN) networks. It comes with an easy to use GTK2 frontend and is small enough to fit on a small portable system. It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. Because of its client-server architecture the scanner engine may be used for different frontends.

tags | tool, wireless
SHA-256 | 0292fa27ac58c68a5c374fda17324debc7c8a108deee8db6e5139ff5c04473c0
anubis-crasher.pl
Posted Mar 5, 2004
Authored by Ulf Harnhammar

Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.

tags | exploit, remote, overflow
SHA-256 | 6f547b7717fcf62439171559f0223a0358e15ef1457120541045bf8af97228f1
anubisAdv.txt
Posted Mar 5, 2004
Authored by Ulf Harnhammar

GNU Anubis is vulnerable to multiple buffer overflow attacks and format string bugs. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others

tags | advisory, overflow
SHA-256 | b0fe1f61d8763fc679ba6f83853b5115d77c1101fb9f753f2ba402ca8da4f1e1
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close