Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server Vulnerability.
eeeadf5c5661cea99c893ac808c25174d4157d2445f74f42511cadec50e1b6c6
Multiple Remotes DoS Attacks in Artisoft XtraMail v1.11 Vulnerability.
23c3ff156c66e5fb680a77af48ec4a963a89ec50a5cf99539958341989ec5197
Linux rpc.nfsd has real_path bug. Vulnerable are RedHat 5.2 and Debian 2.1, local only in most cases.
1853738a3818451ec52cfb97c1b54df616bd2086214f56b0e53130f0dd0433fa
Remote DoS Attack in TransSoft's Broker Ftp Server v3.5 Vulnerability.
bc5c8241925213abf26be436ed1ae35a1c5d72b7971cd1c8a013c92b000c3e87
There is a problem (actually several) with the "cgiwrap" program on Cobalt RaQ2 servers. This can be used to break other sites on a RaQ2 in several ways.
8105413f2c7ca65abc0278ea5141490cab31082aacbbd3cad6b8e1ff4e4a5ffb
Microsoft Internet Explorer 4/5 overflows when the handling of "file://" specification. (file://test/AAAAAAAAAAAA....) This is a typical exploitable buffer overflow. Exploit for Japanese Win98 included.
0bbb99826ab282a9e58564f00c20bed11d1fe94dcf5363010665bfb51873d053
The popular Image viewer "Irfan View32" contains the buffer overflow problem, this problem exists in the handling of Adobe Photoshop image file. Irfan view checks the image type by the image header, if "8BPS" pattern is found in the header, Irfan view judges this file as Photo Shop image. The overflow happens at the handling of reading this marker. Exploit included.
32bee5886fcf4b58ffe13ffdb75e2d80473d3015c25b82a34a4588b95cb22541
Due to improper bounds checking in Ipswitch's IMAIL POP3 server, a buffer overflow occurs when a lengthy username is sent (via "USER <200-500 character username>"). It has been tested this on version 5.07, 5.05, and 5.06. DoS exploit included.
024c34f871eff512dad7f84e077f8d26c4ee44d0b3c97cadac9ee2725c368b32
NT binary and asm source code to Interscan VirusWall 3.23/3.3 remote exploit.
1b62a8c33c4d1c05184875b6f3fd34327a57c57d3760438ef880074fface137e
Byte patch to fix the VirusWall smtp gateway vulnerability.
d5d871078c9f1dca5e89c59ce5251e506988307f440f70fa822f711324df30e4
A buffer overflow exists on the VirusWall smtp gateway - by sending a long HELO command you can overflow the buffer and execute arbitrary code. Example code has been written which will spawn a command prompt on a port you specify.
a4677ab68f3e57a72fc946090b8d39db510d3f964a1b655de1b57ce48936c7a5
Several silently fixed bugs in Sendmail combine to make any sendmail below 8.9.3 insecure. DOS exploit description included, more possible.
dc448e9c2e184b0972cc80f1cc2184a265473cb295116d350c21d5023e9f43e7
Eserv 2.50 Web interface Server Directory Traversal Vulnerability. Tcp port 3128.
e932e1e6f95373493de95080ef89b4f616605659a6a2a433e2ea66a3a67aef71
FTGate Version 2.1 Web interface Server Directory Traversal Vulnerability. Tcp port 8080.
a39589db56834746a49acf91a66d127cb4f2ff6e898a92f87f37ece166a2cf81
Working WFTPD 2.34 exploit for WIN NT 4.0 [SP3-4], Windows 95, and Windows 98.
e93583a8ad6790f8fcc5d89fd92ac5cf35a39e8b949e1f4f009407192d1bd500
The Palm Hotsync manager is vulnerable to a buffer overflow attack that can crash the hotsync application and possibly be used to execute arbitrary code on the machine running the hotsync. Hotsync manager runs on tcp port 14238. Exploit and full advisory here.
248da307134983a853fc649115b333378def514fe8249763e567a75ad6d28e29
Windows NT Spoolss.exe exploit. Local administrator access.
a86ff2874c07882dbf5c8e32c7ccf39d731694c2b13507abe4afc2f15409963e
Internet Explorer 5.0 under Windows 95 and NT 4.0 (suppose Win98 is vulnerable) allows reading local text and HTML files and files from any domain (probably reading files of other types of files is possible). Window spoofing is possible. It is also possible in some cases to read files behind fiewall. This vulnerability may be exploited using HTML email message or a newsgroup posting. Exploit details included. Demonstration page here.
603db408fc66d2ab6cae5ce3dd967cb85920a8c73d94f5c008287f4df83058b9
Windows NT Printer (spooler) Service Vulnerabilities. Affected are all NT systems with a printer or the ability to print to a network printer. Microsoft Windows NT 4.0 Workstation, Server, Terminal Server (all service packs).
a1b3a36b945cd48cd41f26622d2ed5ab79527e51d6ab88dea0e532c2a2f06a7a
A vulnerability exists in "faxalter", part of the hylafax-4.0.2 package which will allow any user gain uucp and possibly root privs. Includes FreeBSD exploit.
68696f6c129b8107698b0a9eed8e8c03714dd4c57913fef0990702c86d7d68a3
.asm source code for the Windows NT RealServer buffer overflow.
658bb877524b8a30f841797996442f51c3e1b94e71d8dfcd6a3668f4b67b98bf
A buffer overflow exists in the web authentication on the Windows NT RealServer administrator port. By sending a long user/password pair you can overflow the buffer and execute arbitrary code. This exploit will spawn a command prompt on port 6968 and has been tested extensively.
0c5dc93d3c04752e283b98ee76d01c69bd18d707ed9649d3fcdcb37f9ce84f39
Remote DoS Attack in BFTelnet Server v1.1 for Windows NT, caused by a buffer overflow in the user name. Example included.
ce349418886f2d5b8203b2fef3ba2e53fadd095cc57fd663844ac6b8bd456135
UnixWare 7's dtappgather runs with superuser privileges, but improperly check $DTUSERSESSION to ensure that the file is readable/writeable or owned by the user running it. Exploit included. w00w00 website here.
f8bee3268bfc608eaab021a68dc06500bce5f3507fc0f6d8f83e6eaa88c360de
bug in Netscape Communicator 4.5(may be other). Windows is affected.
89aaeae33c93d582d73083f04a194bf33b56b6da76f6a45ad271a10b185a8c5d