Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
317b442ec18e1470cbbc488c475e3e53ee24c5b6dc13224668a0e948ed1afb46
alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.
4b0e428b115ff42dd1c7a05f232719d2f35c26e89ba64ff792cf300b83f1cf24
Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.
0a48ed875b165c0e893fa7082fc50f2adaf79df54dd4623c4a8e398ebb08da0f
raddump interprets captured RADIUS packets to print a timestamp, packet length, RADIUS packet type, source and destination hosts and ports, and included attribute names and values for each packet.
7d7217afc274014b99fb77a109fc1940c890987512e662435f6a973c2aa314de
Email Security through Procmail 1.145 - Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.
2d0f4c664d863c657f61f9af6748a8a19a9a63c5b00ade35407079c438ec548c
The CA UniCenter Management Portal versions 2.0 and 3.1 allow for username validation via using the forgotten password feature.
f4684da5e0c106476f2f770687c530b369035e7571afebec64cbbc77d926592a
Emulive Server4 Commerce Edition Build 7560 suffers from a denial of service vulnerability and allows for unauthorized administrative access due to insufficient input verification.
fc29d1775b0b44311d1616e7891e8a27cc8a0c7abb1b30ffea9932ec9f74c208
Proof of concept local exploit that creates a jpeg image to test for the buffer overrun vulnerability discovered under Microsoft Windows. Shellcode and valid addresses have been removed.
e83fbb2e408ae3c6401a0784ac524596ecbe9f71755bf31f63bfb9df23c0e2da
Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.
6a080d6eece24294fe3cc7308971c400eef6bd1eda302eb234157353029917b3
getmail versions 3.2.5 and version 4 releases prior to 4.2.0 suffer from a symbolic link vulnerability that allows for privilege escalation.
1ede5e8f95847bac68ac6e0bcf37788047f31e767417bebac5e0d47ac997e9d2
Remote denial of service exploit for Lords of the Realm III versions 1.01 and below that will crash the server.
aafd15c0fa22fa3995ac2f2f79ca9462b0147632305366fc1435344c6da002bc
Lords of the Realm III versions 1.01 and below suffer from a denial of service attack when an overly long string is supplied as the user's nickname.
be5e72d76f5affa99a38903610f3e2010c8305664ad5ec80ae808d6916a9e220
Secunia Security Advisory - GulfTech Security has discovered two vulnerabilities in YaBB, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.
21c35aaf5e83952cbbf93d64407b511e627fd7eba72729464a1401d3d43f0f2e
Postnuke 0.750 Phoenix is susceptible to multiple full path disclosure flaws.
5de940cb2eb4befc2477653c74b806a79648a9acdc55290c066c338d344ba3f0
Sun Security Advisory - A buffer overflow vulnerability exists in the Netscape Network Security Services (NSS) library suite that is a security component used by most of the Sun Java Enterprise System (JES) components such as Web Server, App Server and Portal Server. This vulnerability may allow a remote unprivileged user to execute arbitrary code on vulnerable systems during SSLv2 connection negotiation.
a9f963b9c6343d5bbca49c391be294459d91ead6eb5f1780f867ac46130e35cc
Secunia Security Advisory - Multiple vulnerabilities have been reported in xine-lib, which can be exploited by malicious people to compromise a user's system.
75b98f70d4269127ed3bf1766ee6a39c21723a449ef498d1fc7e8951c8c66f33
Four default username/password pairs are present in the Sybase database backend used by ON Command CCM 5.x servers. One of the username/password pairs is publicly available in a knowledgebase article at ON Technology's web site. The database accounts can be used to read and modify all data in the CCM database.
dfc05a01176771202a8e0449359f5636358366e9a762b44fdb67cb186174f15a
Gentoo Linux Security Advisory GLSA 200409-24 - The foomatic-rip filter in foomatic-filters contains a vulnerability which may allow arbitrary command execution on the print server. Packages below and equal to 3.0.1 are susceptible.
55040b913532cf5112f4f0af8c33c868135f54a11521c320ab6406dc899a6184
Mambo versions 4.5 and below are susceptible to cross site scripting and remote command execution flaws.
f1adb6277c56b90345f1a0481e0f3f0ec78fce087033de3e0c2aa3b0ec129889
TUTOS 1.1 is susceptible to SQL injection and cross site scripting attacks.
f129e4fcfb3dcf070e7d8891ee5347a3f9ad30e61a026d6d217fe73f40a01787
Visual proof that God has possibly deliberately pushed the recent hurricanes in Florida through territories that voted for Bush.
fa58e9baf908c99700dfb53f74995250ef83df4a37919409d8c4594b5bee6c8d
Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in FreeRADIUS, which can be exploited by malicious people to cause a DoS (Denial of Service).
e72f4359f49f5a8ba1bc026952276e8d406f2f44f6f0b75e4fa12b5282a3a176
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
75ab919e6b0624a04b8db5c5ee1895e8db0cccbc43c794d7aa2b2476a1094b4d
Fakebust is a simple, open-source, user-friendly, intuitive and very rapid malicious code analyzer that can partly replace and in certain aspects outperform an expensive, strictly controlled sandbox setup.
819c715400d0031c57cdcd4ca690905959ddce6857b8c4b80a6dfe213f3e387f
SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.
48285b5e0edae31b820b995a90abdf17758a4946dac7060fdb8d9c3e4a2679aa