WebRamp M3 remote network access bug allows remote attacker to easily connect to the router via telnet; default admin password poses additional security risks.
a2c726967e60574c477b6699f93e662a5cf819223fc5a80c12dabbea848a75f0
Windows 95/98 Network File Sharing Security Hole - Sniffed authentications can be used to impersonate network users and establish valid connections, giving a malicious attacker the opportunity to easily read and write files from/to Win95/98 machines.
b62fc3f0ff04182ab1cfdcc946980620cc6a9487192cd7fee5fbbfff1d493001
Sendmail 8.9.2 Denial of Service exploit code.
94909bd0dc366bd42f8c781b305c85ac38cce1c99b9811467f3d2efef15067f9
Another script that exploits and/or patches Unix boxes using modems susceptible to the "+++ATH0" modem-based DoS attack as described here.
d9df9b89af71ad4c2649368718ecaa47d0e918615f6d93495f21697cc5223c9c
SUN Solaris 2.5, 2.5.1, 2.6, 2.7 (X86 and SPARC architectures) Automountd vulnerability - remote exploit of automountd with updated code that allows malicious remote user to execute ANY program on any default installation of SUN. Incorporation of new rpc.statd into exploit code allows remote user to utilize the TLI protocol to spoof RPC packets at DNS level. Read the cop-01.txt automountd/rpc.statd exploit whitepaper for more details.
ba82eabeee22b98ef98e11f045d2987f1037c80446ba3348f27b53fffe4d9ebd
Vulnerability in the BackWeb Polite Agent Protocol allows malicious attacker to "spoof" BackWeb server.
ef49cc707136bd5046b43d27c34f92f4f0f68856ba4fe17e79d9b2d74fc37cbe
beace - socks 5 irc clone loader that loads a variable number of clones through different socks servers onto different irc servers, then executes a predefined script. It also hides the hostmask from lame mirc users using color codes.
1001c5dd92d928835cd9ebd778507adfb69730b4ff71b0643cbef45265188bc8
Bigfoot/Bellsouth Webmail bug allows malicious users to exploit cached pages to access accounts of other users.
bde6766f3ce84cac4ba43126682e793feeb088c8d5295dd62f7ea5da219cdaf4
CGIc Library is vulnerable to buffer overflow allowing remote attacker to get root access.
10d8fe82114e5c569b2fda157292f8c2fe2680c172d99c2c8a564211ef3d01b5
Cisco Security Notice: Cisco IOS Syslog Crash - Certain versions of Cisco IOS software may crash or hang when they receive invalid user datagram protocol (UDP) packets sent to their "syslog" ports (port 514), from tools such as the latest nmap scanner. This severe DoS attack can completely shut down Cisco IOS products and force manual physical reset.
84d53454ce9ad5b065a3bc256cbb42fb3fcbf37a71204c411d2134abb935d2f8
Details about how easy it is to remotely identify Cisco products running IOS code.
e74ad135d52bf8d21854f8625d05d7c1becc82ed522a986af2fb8778e32ae6e9
Description of the Sun 2.x automountd/rpc.statd exploit remote program execution exploit.
d7d48d6fd6aaf0b4e2f6b400db2c49e5b480d4068af05c6149e46d51fb638639
DPEC's (www.dpec.com) Online Courseware has a nasty bug in it that allows anyone to change anyone elses password without knowing what their current password is (including admin accounts!).
62e915c7eff3282dd1eb84b7f090cb26d629fe5fcd3d33f310e95bb6715af430
As a followup to the L0pht Heavy Industries, we have a program designed to ease the modification of MAC addresses in Windows environments.
16a96e9c7c4f6855f3f4a4146be95d8926fe170206dde0a3e6760132f71c6083
An article on UNIX ELF PARASITES AND VIRUSES including a fully working parasite infector and binary virus for Linux (UNIX portable however). The parasites and virus described and given do not destroy the executeables functionality but instead as with many DOS viruses simply append new code to the image. Rudimentary techniques for disabling the parasites and virus is also described. (includes LONG rant at beginning by author).
41101f0b3c5ca938f20c81b9751270536b75203824557fe9301873ac62f7da1e
ff.core local root exploit for Solaris 2.5.1 and 2.6.
17d2d3eae48ebb4c573b3fda1d608f181dca9d70d743779d859173af025a5053
Major security problems in Debian distributions (1.3 and later) of the ftpwatch package allow simple root access.
e5df69e725ae9e4fcc4443d44dfc95654cb9f1545510b0197596c3e97fadb8ad
Default permissions on Registry key creates a getadmin hole - security hole in the winlogon registry key on NT 4 (with all SPs) allows elevation of privileges to both local and global Administrator level. Local root compromise. VC++ exploit code included.
a8f21acd06a3b712d83d19cf99ec80079e3c13dce4672a42907c8d14af1f2bca
HTTP REQUEST_METHOD flaw allows for stealth and/or spoofed attacks on web servers.
b4799c31790ebda709aa482851eba24c210dd04d38d678f56d727a7ea1975ab4
Using Visual Interdev 6.0, remote attacker can connect to IIS 4.0 Servers without being asked for any security passwords, and make changes to remote server files without being logged at all.
28b3d8ae3298a8a7503838c7f214c4e520c73eba9458918bf02d83d9587c676b
Iomega One-Step Backup software "security tab" uses VERY weak encryption.
19eed9b5096f8df82ab2c5c353cc39c01981ecc6e621c2e824fa3b892524a99f
Exploit code for Linux 2.0.36 - local port/memory DoS attack.
c6d540e7c839d455881d48be9058dbb2d3501dbdd501ae0dfa9572ed941f3e20
A tool designed to monitor directory activity, copy transient files based upon regular expression matching, syslog upon seeing links created, etc. etc.
009d0caa417af9984853ed35b338892c7e71f91002af3a6f3002f7c09c443272
Livingston PM3 DoS attack.
38b30f09114c09ae5bbbcfaf35d0114eb19bb8deb2a08e122383a8b949bc4d6a
Denial of Service attack exists in Lotus Notes SMTP Server.
89034d5718d66dedf6d9589d6504402105ccc01d6199fb45b49e839e5db470d6