re

VeriSign Addresses SSL Certificate Flaw





re

Survey - Privacy Breaches Rampant In Corporations




re

Soaraway Security Spending Keeps Breaches In Check




re

Vista Security Credentials Tarnished In Malware Survey




re

Data Breaches Cost $6.6 Million On Average, Survey Finds




re

Survey Reveals Culture Of IT Admin Snooping




re

Survey - Hackers On Vacation Before Q4 Saturation




re

Survey - Half Of Businesses Do Not Secure Personal Data





re

Most Consumers Reuse Banking Passwords On Other Sites




re

Survey - Cloud Computing Risks Outweigh Reward




re

1 In 10 Americans Prefer Colonoscopies To PC Security








re

Whisper This, But Java Deserialization Vulnerability Affects More Libraries








re

Scientologist Overlord Declares Victory Over Anonymous






re

Stuxnet-Like Attacks Beckon As 50 New SCADA Threats Discovered





re

New Worm By Creators Of Stuxnet Is Suspected






re

'Super-Powerful' Flame Worm Actually Boring Bloatware






re

FutureSoft TFTP Server 2000 Transfer-Mode Overflow

This Metasploit module exploits a stack overflow in the FutureSoft TFTP Server 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This Metasploit module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all).




re

Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow

This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.




re

Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow

This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.




re

Oracle Weblogic Apache Connector POST Request Buffer Overflow

This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. In addition, the Weblogic Apache plugin version is fingerprinted with a POST request containing a specially crafted Transfer-Encoding header.








re

Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf

Anomalous Payloadbased Worm Detection and Signature Generation.




re

Exploit Web 2.0, Real Life XSS-Worm

Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm.




re

Using ShoutBoxes To Control Malicious Software

Whitepaper called Using "ShoutBoxes" to control malicious software.




re

LPRng use_syslog Remote Format String Vulnerability

This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin".




re

PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution

PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit.




re

Linksys E-Series Remote Code Execution

Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm.




re

Linksys Worm Remote Root

Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi.




re

Linksys E-Series TheMoon Remote Command Injection

Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5.