pgpenvelope is an interface to meld using Pine with GnuPG, the GNU Privacy Guard. It allows one to sign/encrypt/decrypt/verify one's mail messages using GnuPG from within Pine. Ease of installation and use, and a nice interface are primary goals during development. In addition to being just a Pine filter, pgpenvelope tries to maximize the use of procmail so that signed messages only need to be verified only once. A fix for a bug concerning selection of the signing key.
ee05d8caf85dee0009bdc6587d70ad3b4ca7d421ccfe473d8de442bc92e9dfb9
Network Associates COVERT Labs Security Advisory - The indexing utility webfind.exe distributed with O'Reilly WebSite Professional contains an unchecked buffer allowing for the remote execution of arbitrary code on vulnerable hosts.
36228147ba09ed48a48ec3c22b40ef8ab5a8ced86f40414d41d26c67a57aee4c
Cerberus Information Security Advisory (CISADV000718) - A buffer overflow has been discovered in webfind.exe which comes with O'Reilly's WebSite Pro. This overflow can be exploited by an attacker to execute arbitrary code. If webfind.exe receives a search string of over 1024 bytes the stack is overwritten. A proof of concept exploit is included.
12b26b233ae8e86c75290b8e6e7d8e59ce23a84ea10e6ac5d0c3e8d5251236b9
Cerberus Information Security Advisory (CISADV000717) - A buffer overflow has been found in O'Reilly's Website Pro 2.4. This overflow can be exploited by an attacker to execute arbitrary code.
d3fab097c78c31f8e65dddbeda370b181d0fbaa21fbc7ef9e47c6007ad36adcb
ISBASE Security Advisory(SA2000-02) - Microsoft IIS v4.0 and 5.0 for Windows NT and Windows 2000 sometimes displays the contents of files that should not normally be displayed and sometimes contains sensitive data. ISS can be tricked into calling ISM.DLL and exposing the contents of .asp, .asa, and .ini files. Exploit description included.
c08944303a5c4fb8db44beece6ca8c9e5f3f74e31842f8ec050ebb34e977435c
Network Associates COVERT Labs Security Advisory - The L-Soft LISTSERV web archive (wa,wa.exe) component contains an unchecked buffer allowing remote execution of arbitrary code with the privileges of the LISTSERV daemon. Vulnerable systems include L-Soft LISTSERV Web Archives 1.8d (confirmed) and 1.8c (inferred) for Windows 9x, Windows NT 3.5x, Windows NT 4.0, Windows 2000, UNIX (all vendors), and OpenVMS VAX.
a3eaef27c0c60ab4d4d042110fa7fbaa9e62953241047c765cb69fd3ca8bafd8