exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-03-05 to 2004-03-06

mimedefang-2.40.tar.gz
Posted Mar 5, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: If multiple virus scanners are installed, they are all used. Default action for viruses (in the sample filter) is now discard. Added a new notification facility to allow external software to react to changes in multiplexor state. It now passes both the raw input message and the unpacked, decoded parts to the virus scanner making virus detection much more reliable.
systems | windows, unix
SHA-256 | 16d2bcdac52634580263e0b9c4e716bb910c40de0c1423bdffcab294547aa8cb
hgmcrash.zip
Posted Mar 5, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Haegemonia version 1.07 and below denial of service exploit. Updated to support the other games from Desert Rats that are not even released yet but hold the same vulnerability.

tags | exploit, denial of service
SHA-256 | e6a331c593c7fe0a0312e639ccf14bdb041134985719b0f7680d0a645160c8ec
invision13.txt
Posted Mar 5, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Invision Power Board versions 1.3 Final is susceptible to a cross site scripting attack.

tags | exploit, xss
SHA-256 | 93d8939b30b06bd6edcf59474442458101779057deb1b80413667302d3c4d1bf
virtuanews103.txt
Posted Mar 5, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

VirtuaNews Admin Panel version 1.0.3 Pro is vulnerable to a cross site scripting attack.

tags | exploit, xss
SHA-256 | 205786c68330b41eb6b26b19658148764eb7d43fc3a1175dc049219bdcbb8f1b
slmailwm.txt
Posted Mar 5, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR05022004b - SLWebMail has multiple buffer overflow vulnerabilities that are related to ISAPI appliactions.

tags | advisory, overflow, vulnerability
SHA-256 | 790511422fd37d4dce237d9ab6d5bcca33b01748ee585626ae4f96d6e9de7c25
slmailsrc.txt
Posted Mar 5, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR05022004a - SLMail Pro Supervisor Report Center versions 2.0.9 and below are vulnerable to a buffer overflow attack when supplied with an overly long HTTP sub-version.

tags | advisory, web, overflow
SHA-256 | bbf99c5e556389172e13039eabaf73dc04ef299f0efb85553c10a6ffac15cee4
rfcbof.zip
Posted Mar 5, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Exploit for Red Faction versions 1.20 and below that have a client-side buffer overflow.

tags | exploit, overflow
SHA-256 | 01c7b9282fc2aa240cbc56fcdaaa2305670964794ae290b72a06e4e3f1e60a0c
prismstumbler-0.7.0.tar.gz
Posted Mar 5, 2004
Authored by Florian Boor | Site prismstumbler.sourceforge.net

Prismstumbler is software which finds 802.11 (W-LAN) networks. It comes with an easy to use GTK2 frontend and is small enough to fit on a small portable system. It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. Because of its client-server architecture the scanner engine may be used for different frontends.

tags | tool, wireless
SHA-256 | 0292fa27ac58c68a5c374fda17324debc7c8a108deee8db6e5139ff5c04473c0
anubis-crasher.pl
Posted Mar 5, 2004
Authored by Ulf Harnhammar

Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.

tags | exploit, remote, overflow
SHA-256 | 6f547b7717fcf62439171559f0223a0358e15ef1457120541045bf8af97228f1
anubisAdv.txt
Posted Mar 5, 2004
Authored by Ulf Harnhammar

GNU Anubis is vulnerable to multiple buffer overflow attacks and format string bugs. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others

tags | advisory, overflow
SHA-256 | b0fe1f61d8763fc679ba6f83853b5115d77c1101fb9f753f2ba402ca8da4f1e1
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close