Remote Denial of Service for CProxy v3.3 - Service Pack 2 for Windows NT.
9ac11023436a234df248b583ff8d03b1479376974e945735da16e7d03204fcf6
/usr/local/games/xsoldier local root exploit. Tested under Mandrake 7.0.
2efbf7e734506a09a852e6b3154a6163a11aff489a05f01d6c99f70a70026d5b
BSDI 4.0.1 klogin remote root buffer overflow. The bug is actually in the kerberos library so this affects all kerb services (kerbIV). This code should need minimal (if any) modification to use on other kerberos services.
1b0f7877e7927a3a5a48023fc649c6dac7e3795fa63faecbebcd4b1f20ef1e42
AUX Technologies Security Advisory - Be/OS Remote Denial of Service. The Be/OS Operating System version 5.0 has a vulnerability in the tcp fragmentation which can lock up the system, requiring a cold reset. The bug can be reproduced using ISIC-0.05.
5ebd3591f9625aeabd9c74fdf640c918466886138b9473eb70cb816cd9b82463
NetProwler 3.0, a network based intrusion detection system, has a remote denial of service vulnerability. The software crashes when two fragmented IP packets are sent to an IP address that it is profiling. Netprowler must be profiling ftp in order for the exploit to work. Please note that Netprowler logs all incoming alerts to a Microsoft .mdb file. Please read RFP2K04.txt for more information.
01dfbeff982172b700a96a3ad3afd0f8babfbb62d8508a80fe57958e3f4d2e87
l0phtl0phe-kid.c - Easy antisniff v1.02 exploit. l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks. This version has been made easy enough for script kiddies to use - to avoid that "doesn't work" lamer claim.
bd31032131862d82287cf734e1ae6420cdb563449a5eb13f9c348e7266dd300d
l0phtl0phe.c - antisniff exploit (1.02 included). l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks.
936d433c03025bd9a3d606c0f3d43a479b07e715b0201d0e5f316e3adcac8c05
SuSE 6.3 and 6.4 Glomelib local root exploit. All gnome apps have an exploitable buffer overflow when getting the DISPLAY environment variable.
9fe0131a24c1749a6647ad05e7ca960d784f79dbeb652d98418ed7fb5e7813b7
ADMDNews_v2 - WinNT/Win2K x86 exploit for NetWin (www.netwinsite.com) DNews server (v5.0f - v5.3e3) gupcgi.exe/dnewsweb.exe CGIs. This program exploits the buffer overflow condition in gupcgi.exe/dnewsweb.exe CGIs while processing the "cmd" parameter. Tested and confirmed under WinNT 4.0 SP5/SP6 & Win2K Beta 3 RC2 (build 2128).
a06f88d7f2ddcc83936b33dc931f7f8e3122cf05e01ce50bac5e4b98045a4016
Sniffit 0.3.7beta Linux/x86 Remote Exploit. Tested on RedHat 5.2, 6.0, 6.2.
23c271cadbc52f8891f04dff58f2d091757e47858573b3d9b6ea26e75ffc4906
The Netopia R9100 permits a user not authorized with a special security password to neverthless modify the SNMP community strings, including enabling SNMP access that should be disabled.
3168f68634d059aaa9ea3f13c15e52e139e10b5ab83eef2a37fba5ca881c8d62
Users can access the mailbox's content of anybody on the system. They can also steal their POP passwords since Emurl allows you to fetch your POP email from more than one source.
35e647237c0a38d4a34398da868edd6414f0a0f6309e46a65ff713c97f3e4d78
A file called adpassword.txt is world readable as it is assigned the wrong permissions. This will allow a malicious attacker to read the contents of the file, to crack the DES encrypted password it contains (using a common-or-garden password cracker), and to edit banner entries,to add or to remove banners.
6c3ff8a442e1d2635cfd0603a063047b2989029691b11b442d5c9cce20f68a72
Remote Denial of Service for CProxy v3.3 - Service Pack 2. This program xploits an overflow vulnerability in CProxy 3.3 SP2 HTTP Service (8080), causing server shutdown.
414890f4eae14551c1d605e97ecea325b12eead335724787e3754a807c6e5230
Cisco 760 Series Connection Overflow. Affected Systems: Routers Cisco 760 Series. Others not tested.
49c9851a414a339e8fb03b576ee74281497581f96f35f25c614707a6294d572a
Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.
7e8843302cd134bdc683267eeed64db268f619dcb7483ba80947f7f20d7713d0
A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and reload if the IOS HTTP service is enabled and browsing to "http://<router-ip>/%%" is attempted. This defect can be exploited to produce a denial of service (DoS) attack. This defect has been discussed on public mailing lists and should be considered public information.
06968d61e8af1b8d044e7641ad890947a953133f8a4264e14082028a3cc839c8
A vulnerable secure shell distribution is available from the popular Zedz Consultants FTP site (formally known as replay.com). The RedHat Linux RPM ssh-1.2.27-8i.src.rpm contains a PAM patch which contains faulty logic allowing users to essentially pass through the username/password authentication step and gain shell access.
b57e79520315127b620ca4b51d6c7b231203c8de9f7862f0c36dadb45cea51a3
Bypassing Warnings For Invalid SSL Certificates In Netscape Navigator.
08d9a04187e702e38f43d13b65214f58dbce9985e976ef91593cde3c9be2e08a
Here's an overflow exploit that works on a non-exec stack on x86 boxes. It demonstrates how it is possible to thread together several libc calls.
3238065018d8cc59f08614d088172be8ae759fa0a29334aa5cf53f44f305b996
There is a security problem with shtml.exe that allows anyone to explore the local path of IIS web server.
a81fefb3352747deb54240fa5b25c5a5809579acbd6503684344b867038b8d8f
Simple DOS attack against Cayman 3220-H DSL Router. Large username or password strings sent to the Cayman HTTP admin interface restart the router. Router log will show "restart not in response to admin command".
3ae878f8c7a9b943309036f7465bd350a17e5d03e16ce1406143f4bf73085af0
Cerberus Information Security Advisory (CISADV000505) - The Cerberus Security Team has found a remotely exploitable buffer overrun in Netwin's (http://netwinsite.com) DNewsWeb (dnewsweb/dnewsweb.exe v5.3e1), CGI program designed to give access to NNTP services over the world wide web. By supplying a specially formed QUERY_STRING to the program a buffer is overflowed allowing execution of arbitrary code compromising the web server.
6f72b6f4d384bdcf7670e19301cef27ef2e199ac7ae94fecc8d11621cfa61f7b
Network Associates, Inc. COVERT Labs Security Advisory - An implementation flaw in the InterScan VirusWall SMTP gateway allows a remote attacker to execute code with the privileges of the daemon.
9b36112a1cd5cd874728fcf15c819f8bfd56941ce60048b6bc3d056dd9fd35f2
Cerberus Information Security Advisory (CISADV000504) - The Cerberus Security Team has found a remotely exploitable buffer overrun in Netwin's (http://netwinsite.com) DMailWeb (dmailweb/dmailweb.exe v2.5d), CGI program designed to give access to a user's SMTP and POP3 server over the world wide web. By supplying a specially formed QUERY_STRING to the program a buffer is overflowed allowing execution of arbitrary code compromising the web server.
47a0edd015b1f01cce3d508c12cc5b2cf7330ba998a12a9c7aaf7acfd187723d