what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 95 RSS Feed

Files

cognos.powerplay.txt
Posted Aug 17, 1999

Cognos PowerPlay Web Edition software for Microsoft NT Server contains a security vulnerability in which unauthenticated web users can access cube data. Negative vendor response. 8.688 kb.

tags | exploit, web
SHA-256 | 0b738e5df294d5573c200c6b08586235de8961bfd2cc25aff789c8397786fa94
h-thief.txt
Posted Aug 17, 1999

Security vulnerability in the customer web interface at hustler.com allows malicious attacker to hijack any user accounts, and gain access to credit card and personal information. HTML exploit template included. 1.730 kb.

tags | exploit, web
SHA-256 | add2370cf21bee06621bdf7e4288deba5511fa40a7eff9ed51c8e2ddcfbbfa8b
hackasite1.zip
Posted Aug 17, 1999
Authored by nemesystm

Hack-A-Site I. A detailed kit on how to hack an Microsft IIS Server using the eEye exploit.

tags | exploit
SHA-256 | 3938deff6439afd2832ba0c12379ee7feee4af22310842261e74484d666cdf03
hhp-pine_adv0004.txt
Posted Aug 17, 1999
Authored by hhp, elaich aka LoopHole of the hhp

The Pine MUA up to and including v4.10 contains a security hole that allows a malicious remote attacker to potentially execute arbitrary code, resulting in possibility of root compromise. Exploit code included.

tags | exploit, remote, arbitrary, root
SHA-256 | 3054c916fc2bce91bd674955b51935253d8747420055d286dc452841681903dd
ipop2d.txt
Posted Aug 17, 1999
Authored by Bind

exploit for ipop2 daemons shipped with the imap-4.4 package; remote attackers can spawn a shell with uid of user "nobody". 3.060 kb.

tags | exploit, remote, shell, imap
SHA-256 | 7d55ce13b8ecf9fd7866e3869768d4b34e2c843bd3582cd600a2c3c84a61674d
killmod-0.69.lsm
Posted Aug 17, 1999

LSM to kill modems using +++ATH0.

tags | exploit
SHA-256 | 2386c8313663364e6ac207420d422f44b1039e3a236c379b238a6df54c8427eb
killmod-0.69.tar.gz
Posted Aug 17, 1999
Authored by Jigz, Monkey

killmod.php3 is a php front end that calls a simple shell script (killmod.sh) that allows you to use the +++ath0 bug to hang up older modems.

tags | exploit, shell, php
SHA-256 | 9588b10240e4166ad8ac0237398350c808f935abb5404f1c4f5374f1044c1a8c
ksrt.accelerated-x.bof.txt
Posted Aug 17, 1999
Authored by Jordan Ritter

Security vulnerability in Xi Graphics, Inc.'s Accelerated-X Server 4.x, 5.x (and possibly earlier versions) allows local users to gain administrative privileges by exploiting multiple buffer overflows in the Accelerated-X X server.

tags | exploit, overflow, local
SHA-256 | c4cd05a0c37cd2bee8385be2f61f1c7214528e9d88bfe332939118c591902703
ls0f.c
Posted Aug 17, 1999
Authored by Bind

lsof 4.40 exploit, local root compromise. 0.901 kb.

tags | exploit, local, root
SHA-256 | fd57d63feaa510208b2a6f6141f559fb4c170ddba15ac5de626e6a8d166543b5
ms.outlook.DoS.txt
Posted Aug 17, 1999
Authored by YoDuh

Microsoft Outlook (all versions) does not properly handle X-UIDL: headers in email, resulting in the potential for denial of service attacks against MS Outlook users. Exploit details and patch included.

tags | exploit, denial of service
SHA-256 | d12ee2aa4d12cb6711065f738ba3203b2e541dc23e4013b44f524e9ed4904b38
netscape.js.table.dos.txt
Posted Aug 17, 1999

HTML parsing bug in all versions of Netscape Communicator 4.x allows malicious web master to crash your browser using JavaScript. 1.269 kb.

tags | exploit, web, javascript
SHA-256 | 6ced3284abc7396946a382d88d3c89a374b7179a6143a0b2878359668190c667
retina.vs.iis4-round2-the.brain.txt
Posted Aug 17, 1999
Authored by eEye Digital Security

Detailed description of the Brain File used to uncover the eEye NT4+IIS4 URL buffer overflow remote exploit.

tags | exploit, remote, overflow
SHA-256 | 9ccb8012a7fa14933beb8e4aa92ca1c05c22e3d03e3eed20ffe537042503fb10
retina.vs.iis4-round2-the.exploit.txt
Posted Aug 17, 1999
Authored by eEye Digital Security

Details about how and why the eEye NT4+IIS4 URL buffer overflow remote exploit hole was exploited and released.

tags | exploit, remote, overflow
SHA-256 | d4bc30711d23b93629e3af8119fa500bae9d918c2ecb58bc72ef2fa9b3d36f87
retina.vs.iis4-round2.txt
Posted Aug 17, 1999
Authored by eEye Digital Security

General description of the eEye NT4+IIS4 URL buffer overflow remote exploit.

tags | exploit, remote, overflow
SHA-256 | 6a3eff4bb72d597d70ae5dc2c7d4680f46c2714618348baced0db5374695a7c8
rpc.statd.automountd.bounce.txt
Posted Aug 17, 1999

Older versions of rpc.statd and automountd for various platforms allow remote attackers to execute arbitrary commands and gain root privileges. Sun patches available.

tags | exploit, remote, arbitrary, root
SHA-256 | a0f5e7d59ed9d1715787e9727cd5e407fdcf54f089374dbd6430da9214cb1c93
SDI-pop2.c
Posted Aug 17, 1999
Authored by c0nd0r

Exploit code for remote ipop2d security vulnerability that gives attacker a shell as user 'nobody'.

tags | exploit, remote, shell
SHA-256 | 5811bb6e6d8fe78e6b45fa1a280e0a20b4e12b452134c426650d3ed2168a6966
shadow.passwds.txt
Posted Aug 17, 1999

shadow-980724 contains a security bug when used with '-p passwd' option, such that passwords are not encrypted. Solution: upgrade to shadow-19990607 or later.

tags | exploit
SHA-256 | e35d62a7a6581ebf288d91a5e22b505c48ab2307b22e33defd979153f9c148a3
shadow.root.uid.65536.txt
Posted Aug 17, 1999

shadow-19990307 contains security bug that allows new user with UID 65536 to gain root access, without being logged at all, and with ability to bypass /etc/securetty restrictions.

tags | exploit, root
SHA-256 | 3f3d3298dbb3069425aa0f0cc4b74c2dae96f5c061fbcffee06de675ff87084c
smbval.library.bof.txt
Posted Aug 17, 1999

Exploitable buffer overflows in the smbval library leave numerous systems open to local and remote attacks that can potentially result in root compromise.

tags | exploit, remote, overflow, local, root
SHA-256 | c46d2d7f82df8ad5c62ec97082f0995992637a02c840f7768a22188307e8b043
solaris.2.5.su.expect.txt
Posted Aug 17, 1999
Authored by Dr. Mudge

Sun Solaris 2.5 and earlier contain security hole in the 'su' program that allows scripted brute force attacks on the superuser password without the attacker being logged. Exploit script (coded in Expect) and detailed description included.

tags | exploit
systems | solaris
SHA-256 | bd95eaff399fd0d686613816ee376617456fc414c51f46f76e35100dc7c9da3e
ssh-2.0.12.brute.force.txt
Posted Aug 17, 1999

ssh-2.0.12 allows remote attacker to verify userids.

tags | exploit, remote, cracker
SHA-256 | e159897760527f3e3ce7099c6ed5cf87f3e973ff81e295ebe8d0293cedadc7d1
su+pam.redhat.txt
Posted Aug 17, 1999

Red Hat PAM version of the 'su' utility allows any local user to easily brute force the superuser (root) password with fast scripted (automated) attacks, avoiding all logging via syslog too.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | c23abd14c9e2881dca4bfad7645174d90c764fbcf557a71897e7f5dda127b21f
sudo.info.txt
Posted Aug 17, 1999

Sudo v1.5.6p2-2, a program that provides limited superuser privileges, does not properly handle improper file access attempts, revealing information about file existence.

tags | exploit
SHA-256 | d81be80f43f14771ac7b8428d07e62304fc1814ba6697f40b29a6e5dfb69ccfb
sun.cc.compiler.txt
Posted Aug 17, 1999

"Big Brother" feature that sends lists of your C compiler commands to "ut-cc@sunpro.Eng.Sun.COM" exists in alpha and beta versions of Sun's SUNWspro C compiler package.

tags | exploit
SHA-256 | 24e59d2817633be6d77dc3cc11da5272724e5f3b2396939511a810aafe8126a2
sun.sendmail.security.txt
Posted Aug 17, 1999

Time to upgrade your Sun 5.5.1 and 5.6 sendmail software to version 8.8.8. Sun describes it as "taking advantage of new security enhancements"; I call it "plugging all the security holes in v8.6.9". :)

tags | exploit
SHA-256 | 3cb50955abb9fb4a7fa6f7f8c1c6f2d021336ba39d2f265772ad077d373a6ada
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close