Endeavour Mark II AntiVirus Scanner is an anti-virus scanner for Endeavour Mark II that uses the ClamAV library (libclamav). It allows you to create a list of scan items for frequently scanned locations and features easy virus database updating, all in a simple GUI environment.
dc9f097b7b33ffc6123308c5caffc0e5b20f5916dca866f2c6c47878f6d3cd69
fwanalog is a shell script that parses and summarizes firewall logfiles. It understands logs from ipf (xBSD, Solaris), OpenBSD 3.x pf, Linux 2.2 ipchains, Linux 2.4 iptables, and a few types of routers and firewalls (Cisco, Checkpoint FW-1, and Watchguard). The excellent log analysis program Analog is used to create the reports.
8ddc4c7ec16e59a27691e25fdd1f266838230ee08c3495fa289db0e7fc008e13
Apache 2.0.49 has been released to address three security vulnerabilities. A race condition that allows for a denial of service attack, a condition that allow arbitrary strings to get written to the error log, and a memory leak in mod_ssl have all been addressed.
666378a2dac755746ebe339e702406b4148bfa0f7e45b8cfb45a932c59ff3931
iDEFENSE Security Advisory 03.19.04: Exploitation of default file permissions in Borland Interbase can allow local attackers to gain database administrative privileges. The vulnerability specifically exists due to insecure permissions on the admin.ib user database file. Local attackers can add or modify existing accounts to gain administrative privileges.
b71f1e19f5d04a562354ac69ff0c4e4809b8054067ce74ebf7ae83fa5306c438
smbprint insecurely writes to files in /tmp allowing for a symbolic link attack. Full details on exploitation included.
5f8fabd4db56afb335dc8f91646c031c7ae3fbc783d0d675174bdc907f203a29
Internet Explorer and Explorer.exe can be crashed when a null pointer exception occurs during a shell: call with a double backslash for a filename.
e6a8af3cb27b9431ff48b3e871cc42063063123890dc7539a0dde1e45344aba8
NGSSoftware Insight Security Research Advisory #NISR19042004b - Symantec's Norton Internet Security 2004 Professional makes use of an ActiveX component that is marked safe for scripting, particularly WrapUM.dll. Using the LaunchURL method an attacker has the ability to force the browser to run arbitrary executables on the target.
11d31d97538a7637add15397dc05b7907d588a0e9216c80ae9fa4a9502a8ba11
NGSSoftware Insight Security Research Advisory #NISR19042004a - Installed with Symantec's Norton AntiSpam 2004 product is an ActiveX component that is marked safe for scripting, particularly symspam.dll. However, when the method LaunchCustomRuleWizard is called with an overly long parameter, an attacker can cause a stack based overflow allowing for arbitrary code execution.
b73892705e2a76c1e0de0b2b6bf520d003b24ba8a85ea693d80dca4775212c39
Exploit that performs an attachment spoofing demo for Eudora versions 6.0.3 and below.
0c214a6830a6b38f208d91c88ccce9d0df221e499a4b82c10d438246c122aa6b
eEye Security Advisory - A critical vulnerability has been discovered in the PAM component used in all current ISS host, server, and network device solutions. A routine within the Protocol Analysis Module (PAM) that monitors ICQ server responses contains a series of stack based buffer overflow vulnerabilities. If the source port of an incoming UDP packet is 4000, it is assumed to be an ICQ v5 server response. Any incoming packet matching this criterion will be forwarded to the vulnerable routine. By delivering a carefully crafted response packet to the broadcast address of a network operating RealSecure/BlackICE agents an attacker can achieve anonymous, remote SYSTEM access across all vulnerable nodes.
c6c0d8948e71c161a5add829f745ebab0f86413f58d23225b1380cf524cb01c0
The admin service on Mac OS-X, which runs on port 660, has a buffer overflow vulnerability.
482c55a3dd124804fd01164bf03aea33dfda82b3251f554ad7338459e27e23d4
Remote exploit that causes a server crash in Chrome versions 1.2.0.0 and below.
dcf8df6f24acf38d664322e4c28369904c5ff6469a4572a3985c4476cc1af158
Chrome versions 1.2.0.0 and below allow for reading and writing into allocated memory resulting in a server crash.
c118fcc08c222f28213ddc5a22bf1c4b4784f736134f761325a8cedb02c3edcc
Some amusing flaws in Hotmail.com allows for credential theft.
36c149ffb66c8fd45646c4c58eb4976dbea678cc3ed3634af594e00d8731dca8