Exploit the possiblities
Showing 1 - 25 of 95 RSS Feed


Posted Aug 17, 1999

Cognos PowerPlay Web Edition software for Microsoft NT Server contains a security vulnerability in which unauthenticated web users can access cube data. Negative vendor response. 8.688 kb.

tags | exploit, web
MD5 | d9ba6824b8d4f8b45e36c364ff538ed7
Posted Aug 17, 1999

Security vulnerability in the customer web interface at hustler.com allows malicious attacker to hijack any user accounts, and gain access to credit card and personal information. HTML exploit template included. 1.730 kb.

tags | exploit, web
MD5 | 5fe2cb1eb4ec7399be64391018f7ba24
Posted Aug 17, 1999
Authored by nemesystm

Hack-A-Site I. A detailed kit on how to hack an Microsft IIS Server using the eEye exploit.

tags | exploit
MD5 | c92d781b1793c1e5dad9ef106c969a66
Posted Aug 17, 1999
Authored by hhp, elaich aka LoopHole of the hhp

The Pine MUA up to and including v4.10 contains a security hole that allows a malicious remote attacker to potentially execute arbitrary code, resulting in possibility of root compromise. Exploit code included.

tags | exploit, remote, arbitrary, root
MD5 | 20d8a6a76d5c7a998cafaebcd11b4ec0
Posted Aug 17, 1999
Authored by Bind

exploit for ipop2 daemons shipped with the imap-4.4 package; remote attackers can spawn a shell with uid of user "nobody". 3.060 kb.

tags | exploit, remote, shell, imap
MD5 | b99db7faac1209b79c3b3a9612b3e14e
Posted Aug 17, 1999

LSM to kill modems using +++ATH0.

tags | exploit
MD5 | 6895d48a24ea72ea15c1462e580b2c97
Posted Aug 17, 1999
Authored by Jigz, Monkey

killmod.php3 is a php front end that calls a simple shell script (killmod.sh) that allows you to use the +++ath0 bug to hang up older modems.

tags | exploit, shell, php
MD5 | 5633eb01cd4e6559c3d5a6e5633ff892
Posted Aug 17, 1999
Authored by Jordan Ritter

Security vulnerability in Xi Graphics, Inc.'s Accelerated-X Server 4.x, 5.x (and possibly earlier versions) allows local users to gain administrative privileges by exploiting multiple buffer overflows in the Accelerated-X X server.

tags | exploit, overflow, local
MD5 | 4cd48b59a509324fee3faf53ff9019e3
Posted Aug 17, 1999
Authored by Bind

lsof 4.40 exploit, local root compromise. 0.901 kb.

tags | exploit, local, root
MD5 | 16319fee4858b8a486ca96da43497408
Posted Aug 17, 1999
Authored by YoDuh

Microsoft Outlook (all versions) does not properly handle X-UIDL: headers in email, resulting in the potential for denial of service attacks against MS Outlook users. Exploit details and patch included.

tags | exploit, denial of service
MD5 | e55c720f19f8f28ba2d4a25ffb4895e1
Posted Aug 17, 1999

HTML parsing bug in all versions of Netscape Communicator 4.x allows malicious web master to crash your browser using JavaScript. 1.269 kb.

tags | exploit, web, javascript
MD5 | b6d94dda0d82467cf42f40f31d889270
Posted Aug 17, 1999
Authored by eEye Digital Security

Detailed description of the Brain File used to uncover the eEye NT4+IIS4 URL buffer overflow remote exploit.

tags | exploit, remote, overflow
MD5 | 8b5cc8a34ba6773971ecd60efbe0e4f0
Posted Aug 17, 1999
Authored by eEye Digital Security

Details about how and why the eEye NT4+IIS4 URL buffer overflow remote exploit hole was exploited and released.

tags | exploit, remote, overflow
MD5 | ad5ca07e7344c147a9081189d10e58eb
Posted Aug 17, 1999
Authored by eEye Digital Security

General description of the eEye NT4+IIS4 URL buffer overflow remote exploit.

tags | exploit, remote, overflow
MD5 | 0a21ec62341dc80786a2b555b20e9090
Posted Aug 17, 1999

Older versions of rpc.statd and automountd for various platforms allow remote attackers to execute arbitrary commands and gain root privileges. Sun patches available.

tags | exploit, remote, arbitrary, root
MD5 | f075ae0791604905a4837f45a32eff93
Posted Aug 17, 1999
Authored by c0nd0r

Exploit code for remote ipop2d security vulnerability that gives attacker a shell as user 'nobody'.

tags | exploit, remote, shell
MD5 | 416b48b74ae8cf9843a111a18d464ed5
Posted Aug 17, 1999

shadow-980724 contains a security bug when used with '-p passwd' option, such that passwords are not encrypted. Solution: upgrade to shadow-19990607 or later.

tags | exploit
MD5 | 9e67f0769f19753fe5a456a2399a1f81
Posted Aug 17, 1999

shadow-19990307 contains security bug that allows new user with UID 65536 to gain root access, without being logged at all, and with ability to bypass /etc/securetty restrictions.

tags | exploit, root
MD5 | b096ce34fbd435914b9578e6a14af17e
Posted Aug 17, 1999

Exploitable buffer overflows in the smbval library leave numerous systems open to local and remote attacks that can potentially result in root compromise.

tags | exploit, remote, overflow, local, root
MD5 | 2b07194b4b827e8c43f4a0a2c2c80c82
Posted Aug 17, 1999
Authored by Dr. Mudge

Sun Solaris 2.5 and earlier contain security hole in the 'su' program that allows scripted brute force attacks on the superuser password without the attacker being logged. Exploit script (coded in Expect) and detailed description included.

tags | exploit
systems | solaris
MD5 | d8bb6d4fc490d965f4daa1645fada82f
Posted Aug 17, 1999

ssh-2.0.12 allows remote attacker to verify userids.

tags | exploit, remote, cracker
MD5 | e897cdaa9d425b69676255c3335c02d7
Posted Aug 17, 1999

Red Hat PAM version of the 'su' utility allows any local user to easily brute force the superuser (root) password with fast scripted (automated) attacks, avoiding all logging via syslog too.

tags | exploit, local, root
systems | linux, redhat
MD5 | 3f04992bddafdcbbd5879448eb4d28fc
Posted Aug 17, 1999

Sudo v1.5.6p2-2, a program that provides limited superuser privileges, does not properly handle improper file access attempts, revealing information about file existence.

tags | exploit
MD5 | 6321b3933f068eeeff338008a65dea77
Posted Aug 17, 1999

"Big Brother" feature that sends lists of your C compiler commands to "ut-cc@sunpro.Eng.Sun.COM" exists in alpha and beta versions of Sun's SUNWspro C compiler package.

tags | exploit
MD5 | fc0043185a22f25f8b1064b455c20fa3
Posted Aug 17, 1999

Time to upgrade your Sun 5.5.1 and 5.6 sendmail software to version 8.8.8. Sun describes it as "taking advantage of new security enhancements"; I call it "plugging all the security holes in v8.6.9". :)

tags | exploit
MD5 | e32724071838d6d0da440200560b6bcd
Page 1 of 4

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks
Posted Jan 18, 2018

tags | headline, hacker, government, britain, data loss, germany
Google Intros Security Center Tool For G Suite
Posted Jan 18, 2018

tags | headline, google
Ex-Santander Bank Manager Pleads Guilty To Computer Misuse Crimes
Posted Jan 18, 2018

tags | headline, privacy, bank, data loss, fraud
BIND Comes Apart Thanks To Ancient Denial Of Service Vuln
Posted Jan 17, 2018

tags | headline, dns, denial of service, flaw
Another Round Of Click-Fraud Extensions Pulled From Chrome Store
Posted Jan 17, 2018

tags | headline, malware, phone, google
Satori Botnet Successor Targets Ethereum Mining Rigs
Posted Jan 17, 2018

tags | headline, malware, bank, botnet, fraud
Flaw In VR Porn App Leaves 20,000 Names Exposed
Posted Jan 17, 2018

tags | headline, privacy, flaw
After False Hawaii Missile Notice, FCC Launches Investigation
Posted Jan 15, 2018

tags | headline, government, usa, cyberwar
MaMi Malware Targets Mac OS X DNS Settings
Posted Jan 15, 2018

tags | headline, malware, dns, fraud, apple
Meltdown-Spectre Patches Causing Issues With Industrial Companies
Posted Jan 15, 2018

tags | headline, flaw, patch, scada, intel
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By