all things security
Showing 1 - 25 of 49 RSS Feed

Files Date: 2004-09-21

Clam AntiVirus Toolkit 0.80rc2
Posted Sep 21, 2004
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
MD5 | a275ab5511a8828b870b1b2b096882a8
alph-0.3.tar.gz
Posted Sep 21, 2004
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added rot13, libs, and a fix.
tags | encryption
MD5 | 0c29dae0af5427553bb08dd7698ce30a
p3scan-1.0.tar.gz
Posted Sep 21, 2004
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

tags | worm, web, trojan
systems | linux, unix
MD5 | d5d354f85727667e781bc5e05e4ffb4d
raddump-0.2.tar.gz
Posted Sep 21, 2004
Authored by Jon Moore | Site sourceforge.net

raddump interprets captured RADIUS packets to print a timestamp, packet length, RADIUS packet type, source and destination hosts and ports, and included attribute names and values for each packet.

tags | tool, sniffer
MD5 | f96cc886534fddbd5137af3484d0d440
html-trap.procmail.1.145.gz
Posted Sep 21, 2004
Authored by John Hardin | Site impsec.org

Email Security through Procmail 1.145 - Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

Changes: Various bug fixes.
tags | worm, trojan
systems | unix
MD5 | 4c238be4a482900ad0414eedeb347be7
caEnumeration.txt
Posted Sep 21, 2004
Authored by Thomas Adams

The CA UniCenter Management Portal versions 2.0 and 3.1 allow for username validation via using the forgotten password feature.

tags | advisory
MD5 | 64aafa3137e8233bcbc0dd1a5b94e372
EmuliveVuln.txt
Posted Sep 21, 2004
Authored by James Bercegay | Site gulftech.org

Emulive Server4 Commerce Edition Build 7560 suffers from a denial of service vulnerability and allows for unauthorized administrative access due to insufficient input verification.

tags | exploit, denial of service
MD5 | 473a1647cd41c7d4d3c4eb2f29e8aa3d
ms04-028.sh
Posted Sep 21, 2004
Authored by perplexy

Proof of concept local exploit that creates a jpeg image to test for the buffer overrun vulnerability discovered under Microsoft Windows. Shellcode and valid addresses have been removed.

tags | exploit, overflow, local, shellcode, proof of concept
systems | windows
MD5 | 78666a3a509861cea8ca1d0780d0d134
pinnacleShow151.txt
Posted Sep 21, 2004
Authored by Marc Ruef | Site computec.ch

Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.

tags | advisory, denial of service
MD5 | 7301316e747bd1d838dc77d60e5e61e5
getmailroot.txt
Posted Sep 21, 2004
Authored by David Watson

getmail versions 3.2.5 and version 4 releases prior to 4.2.0 suffer from a symbolic link vulnerability that allows for privilege escalation.

tags | advisory
MD5 | e48e7bc6e8db6d267a0881e6e0c0abb9
lotr3boom.zip
Posted Sep 21, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for Lords of the Realm III versions 1.01 and below that will crash the server.

tags | exploit, remote, denial of service
MD5 | bb718b4f3b9b9ef2ccf38c6c95124664
lotr3boom-adv.txt
Posted Sep 21, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Lords of the Realm III versions 1.01 and below suffer from a denial of service attack when an overly long string is supplied as the user's nickname.

tags | advisory, denial of service
MD5 | e5e64ff5837f15d4a1bab8df35cdf383
Secunia Security Advisory 12593
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GulfTech Security has discovered two vulnerabilities in YaBB, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, vulnerability, xss
MD5 | 601bfa5f8694cac9d18e30b952c24e8b
postnukePath.txt
Posted Sep 21, 2004
Site mantralab.org

Postnuke 0.750 Phoenix is susceptible to multiple full path disclosure flaws.

tags | advisory
MD5 | 81f4fede96a1e21bb6f737f71ce33b99
57643.html
Posted Sep 21, 2004
Site sunsolve.sun.com

Sun Security Advisory - A buffer overflow vulnerability exists in the Netscape Network Security Services (NSS) library suite that is a security component used by most of the Sun Java Enterprise System (JES) components such as Web Server, App Server and Portal Server. This vulnerability may allow a remote unprivileged user to execute arbitrary code on vulnerable systems during SSLv2 connection negotiation.

tags | advisory, java, remote, web, overflow, arbitrary
MD5 | 2befa4954de10c498bad386f00bac1eb
Secunia Security Advisory 12602
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in xine-lib, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | cbb152968504e5b9dc2692c040288890
ONCommandCCM.txt
Posted Sep 21, 2004
Authored by Jonas Olsson

Four default username/password pairs are present in the Sybase database backend used by ON Command CCM 5.x servers. One of the username/password pairs is publicly available in a knowledgebase article at ON Technology's web site. The database accounts can be used to read and modify all data in the CCM database.

tags | advisory, web
MD5 | 2a6a6d4d0287b4220327ede2bd75381e
Gentoo Linux Security Advisory 200409-24
Posted Sep 21, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200409-24 - The foomatic-rip filter in foomatic-filters contains a vulnerability which may allow arbitrary command execution on the print server. Packages below and equal to 3.0.1 are susceptible.

tags | advisory, arbitrary
systems | linux, gentoo
MD5 | c31ff96c13ff56085d5cefe76db81d25
mambo45.jose.txt
Posted Sep 21, 2004
Authored by Joxean Koret

Mambo versions 4.5 and below are susceptible to cross site scripting and remote command execution flaws.

tags | exploit, remote, xss
MD5 | 28348285c00be6936bce480a3500a65c
tutos11.txt
Posted Sep 21, 2004
Authored by Joxean Koret

TUTOS 1.1 is susceptible to SQL injection and cross site scripting attacks.

tags | advisory, xss, sql injection
MD5 | 6c53ff77dda67e1656237552d14cb8a6
GODvsBUSH.gif
Posted Sep 21, 2004

Visual proof that God has possibly deliberately pushed the recent hurricanes in Florida through territories that voted for Bush.

systems | unix
MD5 | cf4388906e6c54b872c60a26c18b711c
Secunia Security Advisory 12570
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in FreeRADIUS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 3354715813179cc34931f1362c31f3ca
Clam AntiVirus Toolkit 0.80-rc
Posted Sep 21, 2004
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
MD5 | 279e560cb45a02d8852351caf0ec1423
fakebust.tgz
Posted Sep 21, 2004
Authored by Michal Zalewski

Fakebust is a simple, open-source, user-friendly, intuitive and very rapid malicious code analyzer that can partly replace and in certain aspects outperform an expensive, strictly controlled sandbox setup.

systems | unix
MD5 | 50fc8f1ee192f711a0cce5a69691790a
sid-0.3.10.tar.gz
Posted Sep 21, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
MD5 | 21f8d67b76623b7587ec469d2a3d141d
Page 1 of 2
Back12Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    8 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close