exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2004-09-21

Clam AntiVirus Toolkit 0.80rc2
Posted Sep 21, 2004
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
SHA-256 | 317b442ec18e1470cbbc488c475e3e53ee24c5b6dc13224668a0e948ed1afb46
alph-0.3.tar.gz
Posted Sep 21, 2004
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added rot13, libs, and a fix.
tags | encryption
SHA-256 | 4b0e428b115ff42dd1c7a05f232719d2f35c26e89ba64ff792cf300b83f1cf24
p3scan-1.0.tar.gz
Posted Sep 21, 2004
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

tags | worm, web, trojan
systems | linux, unix
SHA-256 | 0a48ed875b165c0e893fa7082fc50f2adaf79df54dd4623c4a8e398ebb08da0f
raddump-0.2.tar.gz
Posted Sep 21, 2004
Authored by Jon Moore | Site sourceforge.net

raddump interprets captured RADIUS packets to print a timestamp, packet length, RADIUS packet type, source and destination hosts and ports, and included attribute names and values for each packet.

tags | tool, sniffer
SHA-256 | 7d7217afc274014b99fb77a109fc1940c890987512e662435f6a973c2aa314de
html-trap.procmail.1.145.gz
Posted Sep 21, 2004
Authored by John Hardin | Site impsec.org

Email Security through Procmail 1.145 - Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

Changes: Various bug fixes.
tags | worm, trojan
systems | unix
SHA-256 | 2d0f4c664d863c657f61f9af6748a8a19a9a63c5b00ade35407079c438ec548c
caEnumeration.txt
Posted Sep 21, 2004
Authored by Thomas Adams

The CA UniCenter Management Portal versions 2.0 and 3.1 allow for username validation via using the forgotten password feature.

tags | advisory
SHA-256 | f4684da5e0c106476f2f770687c530b369035e7571afebec64cbbc77d926592a
EmuliveVuln.txt
Posted Sep 21, 2004
Authored by James Bercegay | Site gulftech.org

Emulive Server4 Commerce Edition Build 7560 suffers from a denial of service vulnerability and allows for unauthorized administrative access due to insufficient input verification.

tags | exploit, denial of service
SHA-256 | fc29d1775b0b44311d1616e7891e8a27cc8a0c7abb1b30ffea9932ec9f74c208
ms04-028.sh
Posted Sep 21, 2004
Authored by perplexy

Proof of concept local exploit that creates a jpeg image to test for the buffer overrun vulnerability discovered under Microsoft Windows. Shellcode and valid addresses have been removed.

tags | exploit, overflow, local, shellcode, proof of concept
systems | windows
SHA-256 | e83fbb2e408ae3c6401a0784ac524596ecbe9f71755bf31f63bfb9df23c0e2da
pinnacleShow151.txt
Posted Sep 21, 2004
Authored by Marc Ruef | Site computec.ch

Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.

tags | advisory, denial of service
SHA-256 | 6a080d6eece24294fe3cc7308971c400eef6bd1eda302eb234157353029917b3
getmailroot.txt
Posted Sep 21, 2004
Authored by David Watson

getmail versions 3.2.5 and version 4 releases prior to 4.2.0 suffer from a symbolic link vulnerability that allows for privilege escalation.

tags | advisory
SHA-256 | 1ede5e8f95847bac68ac6e0bcf37788047f31e767417bebac5e0d47ac997e9d2
lotr3boom.zip
Posted Sep 21, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for Lords of the Realm III versions 1.01 and below that will crash the server.

tags | exploit, remote, denial of service
SHA-256 | aafd15c0fa22fa3995ac2f2f79ca9462b0147632305366fc1435344c6da002bc
lotr3boom-adv.txt
Posted Sep 21, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Lords of the Realm III versions 1.01 and below suffer from a denial of service attack when an overly long string is supplied as the user's nickname.

tags | advisory, denial of service
SHA-256 | be5e72d76f5affa99a38903610f3e2010c8305664ad5ec80ae808d6916a9e220
Secunia Security Advisory 12593
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GulfTech Security has discovered two vulnerabilities in YaBB, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, vulnerability, xss
SHA-256 | 21c35aaf5e83952cbbf93d64407b511e627fd7eba72729464a1401d3d43f0f2e
postnukePath.txt
Posted Sep 21, 2004
Site mantralab.org

Postnuke 0.750 Phoenix is susceptible to multiple full path disclosure flaws.

tags | advisory
SHA-256 | 5de940cb2eb4befc2477653c74b806a79648a9acdc55290c066c338d344ba3f0
57643.html
Posted Sep 21, 2004
Site sunsolve.sun.com

Sun Security Advisory - A buffer overflow vulnerability exists in the Netscape Network Security Services (NSS) library suite that is a security component used by most of the Sun Java Enterprise System (JES) components such as Web Server, App Server and Portal Server. This vulnerability may allow a remote unprivileged user to execute arbitrary code on vulnerable systems during SSLv2 connection negotiation.

tags | advisory, java, remote, web, overflow, arbitrary
SHA-256 | a9f963b9c6343d5bbca49c391be294459d91ead6eb5f1780f867ac46130e35cc
Secunia Security Advisory 12602
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in xine-lib, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 75b98f70d4269127ed3bf1766ee6a39c21723a449ef498d1fc7e8951c8c66f33
ONCommandCCM.txt
Posted Sep 21, 2004
Authored by Jonas Olsson

Four default username/password pairs are present in the Sybase database backend used by ON Command CCM 5.x servers. One of the username/password pairs is publicly available in a knowledgebase article at ON Technology's web site. The database accounts can be used to read and modify all data in the CCM database.

tags | advisory, web
SHA-256 | dfc05a01176771202a8e0449359f5636358366e9a762b44fdb67cb186174f15a
Gentoo Linux Security Advisory 200409-24
Posted Sep 21, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200409-24 - The foomatic-rip filter in foomatic-filters contains a vulnerability which may allow arbitrary command execution on the print server. Packages below and equal to 3.0.1 are susceptible.

tags | advisory, arbitrary
systems | linux, gentoo
SHA-256 | 55040b913532cf5112f4f0af8c33c868135f54a11521c320ab6406dc899a6184
mambo45.jose.txt
Posted Sep 21, 2004
Authored by Joxean Koret

Mambo versions 4.5 and below are susceptible to cross site scripting and remote command execution flaws.

tags | exploit, remote, xss
SHA-256 | f1adb6277c56b90345f1a0481e0f3f0ec78fce087033de3e0c2aa3b0ec129889
tutos11.txt
Posted Sep 21, 2004
Authored by Joxean Koret

TUTOS 1.1 is susceptible to SQL injection and cross site scripting attacks.

tags | advisory, xss, sql injection
SHA-256 | f129e4fcfb3dcf070e7d8891ee5347a3f9ad30e61a026d6d217fe73f40a01787
GODvsBUSH.gif
Posted Sep 21, 2004

Visual proof that God has possibly deliberately pushed the recent hurricanes in Florida through territories that voted for Bush.

systems | unix
SHA-256 | fa58e9baf908c99700dfb53f74995250ef83df4a37919409d8c4594b5bee6c8d
Secunia Security Advisory 12570
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in FreeRADIUS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | e72f4359f49f5a8ba1bc026952276e8d406f2f44f6f0b75e4fa12b5282a3a176
Clam AntiVirus Toolkit 0.80-rc
Posted Sep 21, 2004
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
SHA-256 | 75ab919e6b0624a04b8db5c5ee1895e8db0cccbc43c794d7aa2b2476a1094b4d
fakebust.tgz
Posted Sep 21, 2004
Authored by Michal Zalewski

Fakebust is a simple, open-source, user-friendly, intuitive and very rapid malicious code analyzer that can partly replace and in certain aspects outperform an expensive, strictly controlled sandbox setup.

systems | unix
SHA-256 | 819c715400d0031c57cdcd4ca690905959ddce6857b8c4b80a6dfe213f3e387f
sid-0.3.10.tar.gz
Posted Sep 21, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
SHA-256 | 48285b5e0edae31b820b995a90abdf17758a4946dac7060fdb8d9c3e4a2679aa
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close