exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 57 RSS Feed

Files Date: 2005-09-07

ciphire-mail-1.1.009.exe
Posted Sep 7, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Windows version.

Changes: Better handling of Ciphire signatures, better use interface, and many more fixes and enhancements.
tags | encryption
systems | windows
SHA-256 | 729fd918aeca1987d874b0c180e89043c4f55d0f60893968ab16a076b9711c51
ciphire-mail-1.1.009-linux-i686.tar.gz
Posted Sep 7, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Linux version.

Changes: Better handling of Ciphire signatures, better use interface, and many more fixes and enhancements.
tags | encryption
systems | linux
SHA-256 | 5dc2a43975bc86e37df7a18e8d27c4805bb35c7f1f104922d4cd2a238e026b26
ciphire-mail-01.10.09-osx-ppc.dmg
Posted Sep 7, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Mac version.

Changes: Better handling of Ciphire signatures, better use interface, and many more fixes and enhancements.
tags | encryption
SHA-256 | d80dfe22743dcee6f58b2a3158488a69ea6987eec667555e6cf8b50765b62aa5
KNOCK-0-81.ZIP
Posted Sep 7, 2005
Authored by Bruce Ward | Site doorman.sourceforge.net

The Doorman is a port-knocking listener daemon which helps users secure private servers. It allows a server to run invisibly, with all TCP ports closed. This version is the Microsoft Windows binary executable release.

Changes: Fixed the silent doorman problem.
tags | tcp
systems | windows
SHA-256 | 57345ec915673f362174511548c0cbd83c339b83dd62789814fd4735415681a5
doorman-0.81.tgz
Posted Sep 7, 2005
Authored by Bruce Ward | Site doorman.sourceforge.net

The Doorman is a port-knocking listener daemon which helps users secure private servers. It allows a Unix server to run invisibly, with all TCP ports closed.

Changes: Fixed the silent doorman problem.
tags | tool, tcp, rootkit
systems | unix
SHA-256 | 3b5d27272081553f8751d3f4687b9218fa3bc905c56aa394990b3ac608cca24e
LockAuto-Protectv1.5.txt
Posted Sep 7, 2005
Authored by fRoGGz | Site shadock.net

USB Lock Auto-Protect v1.5 uses a weak encryption algorithm to encrypt the password stored in the registry. It is therefore possible to recover the password. POC provided.

tags | advisory, registry
SHA-256 | ecfb8d24e8773db2ddd798cb19d74bc0ec25e0e5247a92816b6d3c8777888344
LDU801.txt
Posted Sep 7, 2005
Authored by conor.e.buckley | Site quixote.at.preempted.net

Land Down Under 801 and earlier suffer from XSS in events.php

tags | advisory, php
SHA-256 | 83fa6b7a9c60dd842f68c8597be41e2990cab238baf08118e586c34244e3edaf
Secunia Security Advisory 16715
Posted Sep 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for kdebase. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, mandriva
SHA-256 | c9168339d2a8b39bc589ff5e0079a3be84a9b81eb98aa83be2ec269e0719ecd5
Secunia Security Advisory 16716
Posted Sep 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for kdeedu. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges on a vulnerable system.

tags | advisory, local
systems | linux, mandriva
SHA-256 | 4bbe4abae81804f3c87d8ec5f772cdd5f548c566ebe7ec6197c33b94bd56d3dc
nufw-1.0.12.tar.gz
Posted Sep 7, 2005
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Added support for some more architectures.
tags | tool, remote, firewall
systems | unix
SHA-256 | 7ed68b31e4fbc47623b9762b4f852bdd4570d1ba909d3568870aa3516ff1473e
MAXdevMD-Pro1.0.73.txt
Posted Sep 7, 2005
Authored by rgod | Site retrogod.altervista.org

MAXdev MD-Pro 1.0.73 and possibly prior versions suffer from remote code execution, cross site scripting, and path disclosure vulnerabilities. Detailed exploitation provided.

tags | advisory, remote, vulnerability, code execution, xss
SHA-256 | 1f58da73f487a9202f48c8402224eecde1e530c476a9fc25e91561c3630502a2
Nixory_v0.1.8.zip
Posted Sep 7, 2005
Authored by Alfredo Spadafina | Site nixory.sourceforge.net

Nixory is an innovative, fast, and powerful anti-spyware program, with a user-friendly graphical interface. It protects Mozilla Firefox from dangerous spyware and harmful cookies.

SHA-256 | f2b19f81d7f94ed5b6aff02ed8188f2227965e0d43551f577bac344d4db8bd5f
Ubuntu Security Notice 145-2
Posted Sep 7, 2005
Authored by Ubuntu, Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-145-2 - USN-145-1 fixed several vulnerabilities in wget. However, Ralph Corderoy discovered some regressions that caused wget to crash in some cases. The updated version fixes this flaw.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 65528870bfd3af1e90d9dd8a01ac3f53e1e019e7001166bdff5b8fc4e2d77c47
stealth_1.34.tar.gz
Posted Sep 7, 2005
Authored by Frank B. Brokken | Site stealth.sourceforge.net

Stealth (SSH-based Trust Enhancement Acquired through a Locally Trusted Host) is a file integrity scanner. It differs from a program like Tripwire in that it does not require the use of read-only media or modifiable logs. It leaves (almost) no trace on the computer being checked. It is very difficult for intruders to detect or evade, and cannot be modified by intruders. It can be used to perform integrity checks on many computers without a heavy maintenance burden. It can be used without being installed on the target computer.

tags | tool, integrity
SHA-256 | b779a2f22dedb0d78ea36a250667c889887e0c7f3ea69661d196773e5c2232ae
WebArchiveX.dll5.5.0.76.txt
Posted Sep 7, 2005
Authored by Brett Moore SA | Site Security-Assessment.com

Prior to September 6th 2005, the activeX component would install and mark itself 'safe for scripting'. The component offers various methods that when instantiated by a malicious web site, can be used to read files from, or write files to the local computer.

tags | advisory, web, local, activex
SHA-256 | 205c2061f89ca6554517260bf21c4e9b70e17a80b61ff8f9dc384b72dfc2fa40
MSRC-6005bgs-EN.txt
Posted Sep 7, 2005
Authored by haxorcitos | Site haxorcitos.com

Microsoft Windows keybd_event validation vulnerability: unprivileged shells or applications executed with the runas application or services with the INTERACT_WITH_DESKTOP flag are allowed to send keys to any application on the Desktop. By sending some short-cut keys it is possible to execute code, elevate privileges and bypass runas or service security restrictions. Proof of concept code included.

tags | advisory, shell, proof of concept
systems | windows
SHA-256 | 1887de02d9899199c5099ca6748b31e81a407148ff7f19442a07314c1ff9c25d
chfeedback.txt
Posted Sep 7, 2005
Authored by deathtrip

The Perl Feedback Form CGI script (chfeedback.pl) lacks variable sanitizing and allows for CRLF injection, enabling addition of email fields.

tags | advisory, cgi, perl
SHA-256 | ba0e2e8aa5b9b43e47fa4c87827fc0d62e1ff23f8d229fe2547644e85631c78b
Gentoo Linux Security Advisory 200509-5
Posted Sep 7, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-05 - James Cloos reported that Perl modules from the Net-SNMP package look for libraries in an untrusted location. This is due to a flaw in the Gentoo package, and not the Net-SNMP suite. Versions less than 5.2.1.2-r1 are affected.

tags | advisory, perl
systems | linux, gentoo
SHA-256 | 7b37959e9fac4d4f7efafafa4925b467bc847de6feb60f4c00cc5d68ad9480b3
Gentoo Linux Security Advisory 200509-4
Posted Sep 7, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-04 - Alexander Gerasiov discovered a flaw in login.php preventing the application from validating whether anonymous bind has been disabled in the target LDAP server configuration. Versions less than 0.9.7_alpha6 are affected.

tags | advisory, php
systems | linux, gentoo
advisories | CVE-2005-2654
SHA-256 | 18d21b92041083f31e11972d0a0bd601a38ee661203942be675644cbccaba8d5
ip-array.0.05.30.tar.gz
Posted Sep 7, 2005
Authored by AllKind | Site sourceforge.net

IP-Array is a linux firewall script written in bash designed for small to mid sized networks. Includes support for traffic shaping and VPN.

tags | bash
systems | linux, unix
SHA-256 | 61912bfa9c58c531dc02285a47c9a536f7da4b9f47db95134af748542331f9ef
phpnukeXSS.txt
Posted Sep 7, 2005
Authored by bhfh

The modules.php script in PHP-Nuke is susceptible to cross site scripting attacks via the query variable.

tags | exploit, php, xss
SHA-256 | febc939a7a6f6974420c3354f6878f0795066b420c51b71a67b56d3730be1752
shellcodes_crypter_v0.2.c
Posted Sep 7, 2005
Authored by Shen139

Shellcode Crypter version 0.2 is a shellcode encryption utility.

tags | shellcode
SHA-256 | c752a5a3bf39bd493b31f307fb1774896a4eb3aaa594b1792da39ec2ceead4c9
Gentoo Linux Security Advisory 200509-3
Posted Sep 7, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-03 - Alexey Dobriyan discovered several format string vulnerabilities in OpenTTD. Versions less than 0.4.0.1-r1 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2005-2763
SHA-256 | 249508bf021ec96fcf6f7b8aef5bf45fffa49eafdadd3292ce8c58b58a7d737e
phpcal.txt
Posted Sep 7, 2005
Authored by rgod | Site retrogod.altervista.org

phpCommunityCalendar 4.0.3 suffers from login bypass, SQL injection, and cross site scripting vulnerabilities. Full exploitation details are provided.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 75d14e631a17b9753a1d296cc1655d186f8c951813db84d623522caced0ca2b9
dl-mancgi.c
Posted Sep 7, 2005
Authored by tracewar

Man-cgi/Man2web/ManView remote command execution exploit. Tested against Man-cgi 1.11. All versions are affected.

tags | exploit, remote, cgi
SHA-256 | 3300bb4e9b0b107c205b3358667f3e44b2322107d91b974768b345a5d6beebc5
Page 1 of 3
Back123Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    4 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close