MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
16d2bcdac52634580263e0b9c4e716bb910c40de0c1423bdffcab294547aa8cb
Haegemonia version 1.07 and below denial of service exploit. Updated to support the other games from Desert Rats that are not even released yet but hold the same vulnerability.
e6a331c593c7fe0a0312e639ccf14bdb041134985719b0f7680d0a645160c8ec
Invision Power Board versions 1.3 Final is susceptible to a cross site scripting attack.
93d8939b30b06bd6edcf59474442458101779057deb1b80413667302d3c4d1bf
VirtuaNews Admin Panel version 1.0.3 Pro is vulnerable to a cross site scripting attack.
205786c68330b41eb6b26b19658148764eb7d43fc3a1175dc049219bdcbb8f1b
NGSSoftware Insight Security Research Advisory #NISR05022004b - SLWebMail has multiple buffer overflow vulnerabilities that are related to ISAPI appliactions.
790511422fd37d4dce237d9ab6d5bcca33b01748ee585626ae4f96d6e9de7c25
NGSSoftware Insight Security Research Advisory #NISR05022004a - SLMail Pro Supervisor Report Center versions 2.0.9 and below are vulnerable to a buffer overflow attack when supplied with an overly long HTTP sub-version.
bbf99c5e556389172e13039eabaf73dc04ef299f0efb85553c10a6ffac15cee4
Exploit for Red Faction versions 1.20 and below that have a client-side buffer overflow.
01c7b9282fc2aa240cbc56fcdaaa2305670964794ae290b72a06e4e3f1e60a0c
Prismstumbler is software which finds 802.11 (W-LAN) networks. It comes with an easy to use GTK2 frontend and is small enough to fit on a small portable system. It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. Because of its client-server architecture the scanner engine may be used for different frontends.
0292fa27ac58c68a5c374fda17324debc7c8a108deee8db6e5139ff5c04473c0
Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.
6f547b7717fcf62439171559f0223a0358e15ef1457120541045bf8af97228f1
GNU Anubis is vulnerable to multiple buffer overflow attacks and format string bugs. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others
b0fe1f61d8763fc679ba6f83853b5115d77c1101fb9f753f2ba402ca8da4f1e1