Exploit the possiblities
Showing 1 - 25 of 95 RSS Feed

Files

cognos.powerplay.txt
Posted Aug 17, 1999

Cognos PowerPlay Web Edition software for Microsoft NT Server contains a security vulnerability in which unauthenticated web users can access cube data. Negative vendor response. 8.688 kb.

tags | exploit, web
MD5 | d9ba6824b8d4f8b45e36c364ff538ed7
h-thief.txt
Posted Aug 17, 1999

Security vulnerability in the customer web interface at hustler.com allows malicious attacker to hijack any user accounts, and gain access to credit card and personal information. HTML exploit template included. 1.730 kb.

tags | exploit, web
MD5 | 5fe2cb1eb4ec7399be64391018f7ba24
hackasite1.zip
Posted Aug 17, 1999
Authored by nemesystm

Hack-A-Site I. A detailed kit on how to hack an Microsft IIS Server using the eEye exploit.

tags | exploit
MD5 | c92d781b1793c1e5dad9ef106c969a66
hhp-pine_adv0004.txt
Posted Aug 17, 1999
Authored by hhp, elaich aka LoopHole of the hhp

The Pine MUA up to and including v4.10 contains a security hole that allows a malicious remote attacker to potentially execute arbitrary code, resulting in possibility of root compromise. Exploit code included.

tags | exploit, remote, arbitrary, root
MD5 | 20d8a6a76d5c7a998cafaebcd11b4ec0
ipop2d.txt
Posted Aug 17, 1999
Authored by Bind

exploit for ipop2 daemons shipped with the imap-4.4 package; remote attackers can spawn a shell with uid of user "nobody". 3.060 kb.

tags | exploit, remote, shell, imap
MD5 | b99db7faac1209b79c3b3a9612b3e14e
killmod-0.69.lsm
Posted Aug 17, 1999

LSM to kill modems using +++ATH0.

tags | exploit
MD5 | 6895d48a24ea72ea15c1462e580b2c97
killmod-0.69.tar.gz
Posted Aug 17, 1999
Authored by Jigz, Monkey

killmod.php3 is a php front end that calls a simple shell script (killmod.sh) that allows you to use the +++ath0 bug to hang up older modems.

tags | exploit, shell, php
MD5 | 5633eb01cd4e6559c3d5a6e5633ff892
ksrt.accelerated-x.bof.txt
Posted Aug 17, 1999
Authored by Jordan Ritter

Security vulnerability in Xi Graphics, Inc.'s Accelerated-X Server 4.x, 5.x (and possibly earlier versions) allows local users to gain administrative privileges by exploiting multiple buffer overflows in the Accelerated-X X server.

tags | exploit, overflow, local
MD5 | 4cd48b59a509324fee3faf53ff9019e3
ls0f.c
Posted Aug 17, 1999
Authored by Bind

lsof 4.40 exploit, local root compromise. 0.901 kb.

tags | exploit, local, root
MD5 | 16319fee4858b8a486ca96da43497408
ms.outlook.DoS.txt
Posted Aug 17, 1999
Authored by YoDuh

Microsoft Outlook (all versions) does not properly handle X-UIDL: headers in email, resulting in the potential for denial of service attacks against MS Outlook users. Exploit details and patch included.

tags | exploit, denial of service
MD5 | e55c720f19f8f28ba2d4a25ffb4895e1
netscape.js.table.dos.txt
Posted Aug 17, 1999

HTML parsing bug in all versions of Netscape Communicator 4.x allows malicious web master to crash your browser using JavaScript. 1.269 kb.

tags | exploit, web, javascript
MD5 | b6d94dda0d82467cf42f40f31d889270
retina.vs.iis4-round2-the.brain.txt
Posted Aug 17, 1999
Authored by eEye Digital Security

Detailed description of the Brain File used to uncover the eEye NT4+IIS4 URL buffer overflow remote exploit.

tags | exploit, remote, overflow
MD5 | 8b5cc8a34ba6773971ecd60efbe0e4f0
retina.vs.iis4-round2-the.exploit.txt
Posted Aug 17, 1999
Authored by eEye Digital Security

Details about how and why the eEye NT4+IIS4 URL buffer overflow remote exploit hole was exploited and released.

tags | exploit, remote, overflow
MD5 | ad5ca07e7344c147a9081189d10e58eb
retina.vs.iis4-round2.txt
Posted Aug 17, 1999
Authored by eEye Digital Security

General description of the eEye NT4+IIS4 URL buffer overflow remote exploit.

tags | exploit, remote, overflow
MD5 | 0a21ec62341dc80786a2b555b20e9090
rpc.statd.automountd.bounce.txt
Posted Aug 17, 1999

Older versions of rpc.statd and automountd for various platforms allow remote attackers to execute arbitrary commands and gain root privileges. Sun patches available.

tags | exploit, remote, arbitrary, root
MD5 | f075ae0791604905a4837f45a32eff93
SDI-pop2.c
Posted Aug 17, 1999
Authored by c0nd0r

Exploit code for remote ipop2d security vulnerability that gives attacker a shell as user 'nobody'.

tags | exploit, remote, shell
MD5 | 416b48b74ae8cf9843a111a18d464ed5
shadow.passwds.txt
Posted Aug 17, 1999

shadow-980724 contains a security bug when used with '-p passwd' option, such that passwords are not encrypted. Solution: upgrade to shadow-19990607 or later.

tags | exploit
MD5 | 9e67f0769f19753fe5a456a2399a1f81
shadow.root.uid.65536.txt
Posted Aug 17, 1999

shadow-19990307 contains security bug that allows new user with UID 65536 to gain root access, without being logged at all, and with ability to bypass /etc/securetty restrictions.

tags | exploit, root
MD5 | b096ce34fbd435914b9578e6a14af17e
smbval.library.bof.txt
Posted Aug 17, 1999

Exploitable buffer overflows in the smbval library leave numerous systems open to local and remote attacks that can potentially result in root compromise.

tags | exploit, remote, overflow, local, root
MD5 | 2b07194b4b827e8c43f4a0a2c2c80c82
solaris.2.5.su.expect.txt
Posted Aug 17, 1999
Authored by Dr. Mudge

Sun Solaris 2.5 and earlier contain security hole in the 'su' program that allows scripted brute force attacks on the superuser password without the attacker being logged. Exploit script (coded in Expect) and detailed description included.

tags | exploit
systems | solaris
MD5 | d8bb6d4fc490d965f4daa1645fada82f
ssh-2.0.12.brute.force.txt
Posted Aug 17, 1999

ssh-2.0.12 allows remote attacker to verify userids.

tags | exploit, remote, cracker
MD5 | e897cdaa9d425b69676255c3335c02d7
su+pam.redhat.txt
Posted Aug 17, 1999

Red Hat PAM version of the 'su' utility allows any local user to easily brute force the superuser (root) password with fast scripted (automated) attacks, avoiding all logging via syslog too.

tags | exploit, local, root
systems | linux, redhat
MD5 | 3f04992bddafdcbbd5879448eb4d28fc
sudo.info.txt
Posted Aug 17, 1999

Sudo v1.5.6p2-2, a program that provides limited superuser privileges, does not properly handle improper file access attempts, revealing information about file existence.

tags | exploit
MD5 | 6321b3933f068eeeff338008a65dea77
sun.cc.compiler.txt
Posted Aug 17, 1999

"Big Brother" feature that sends lists of your C compiler commands to "ut-cc@sunpro.Eng.Sun.COM" exists in alpha and beta versions of Sun's SUNWspro C compiler package.

tags | exploit
MD5 | fc0043185a22f25f8b1064b455c20fa3
sun.sendmail.security.txt
Posted Aug 17, 1999

Time to upgrade your Sun 5.5.1 and 5.6 sendmail software to version 8.8.8. Sun describes it as "taking advantage of new security enhancements"; I call it "plugging all the security holes in v8.6.9". :)

tags | exploit
MD5 | e32724071838d6d0da440200560b6bcd
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
Forbes 30 Under 30 Conference Site Exposed Attendee Details
Posted Nov 15, 2017

tags | headline, privacy, data loss, flaw, conference
The Motherboard Guide To Not Getting Hacked
Posted Nov 15, 2017

tags | headline, hacker, privacy, data loss, fraud, identity theft
Votes In 18 Nations 'Hacked' In Last Year
Posted Nov 14, 2017

tags | headline, government, usa, russia, fraud, cyberwar, social
Shut The Front Door: Jewson Admits To Data Breach
Posted Nov 14, 2017

tags | headline, hacker, privacy, data loss
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close