Twenty Year Anniversary
Showing 1 - 5 of 5 RSS Feed

Files

06-21-99-inetvir.txt
Posted Sep 30, 1999

Internet Viruses Advisory.

MD5 | 4bb9940ca1049a146ba53ecf98867f39
06-21-99-vmware.txt
Posted Sep 30, 1999

VMware v1.0.1 and earlier for Linux contains multiple buffer overflows, allowing local users to obtain root access.

tags | overflow, local, root
systems | linux
MD5 | bde3de95eabc811b7c98dbcb2417d5b6
07-01-99-cable-modems_windows_shares.txt
Posted Sep 30, 1999

Cable modem/DSL users using Windows with shares enabled can allow unauthorized users to access their data. Password protected shares are also susceptible to brute force attacks.

systems | windows
MD5 | fa70478ad635a7140593879e12bd0a6b
09-16-99-ihtml.txt
Posted Sep 30, 1999

Team Asylum has discovered a vulnerability that exists in iHTML Merchant which would allow a malicious hacker to (at the very least) view the protected files in the website's administrative section, giving the attacker the ability to view credit card information. If the iHTML Merchant is being run on Windows 95/98/NT the vulnerability is much more severe. The vulnerability exists in how iHTML Merchant parses code. The attacker could: 1) Delete any file on the server 2) Write a file to any folder on the server. 3) Upload a trojan. 4) Steal credit card numbers, and other hidden information. If the iHTML Merchant is being run on UNIX, the possibility exists that the web site could be altered. These findings reflect the default settings for 95/98/NT and iHTML Merchant.

tags | web, trojan
systems | windows, 9x, unix
MD5 | 7bccac04c20fb5e86a41b88dde56facc
09-18-99-yahoo.txt
Posted Sep 30, 1999

A denial of service attack exists in build 733 of Yahoo! Messenger. The vulnerability exists when Messenger leaves port 5010 open. When a connection is made on port 5010, Messenger crashes. The connection stays open until the user closes the program. Malicious users can not only crash Yahoo! Messenger users, but it also gives them the capability of scanning and detecting Messenger users across wide networks by simply scanning port 5010.

tags | denial of service
MD5 | bc85ccbcb78f9e1576da2fecc22d0386
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Mirai Botnet Adds Three New Attacks To Target IoT Devices
Posted May 19, 2018

tags | headline, malware, botnet
MEPs To Press Zuckerberg On Facebook Privacy
Posted May 18, 2018

tags | headline, government, privacy, facebook
Oh, Great, Now There's A Second Rowhammer Exploit
Posted May 18, 2018

tags | headline, flaw, intel
Alleged CIA Leaker Joshua Schulte Has World's Worst Opsec
Posted May 18, 2018

tags | headline, government, usa, data loss, cia
OpenSSH Arrives In Windows 10 Spring Update
Posted May 18, 2018

tags | headline, privacy, microsoft, cryptography
Julian Assange Said To Have Racked Up $5m Security Bill For Ecuador
Posted May 16, 2018

tags | headline, hacker, britain, data loss
Ex-CIA Man Named As Suspect In Vault 7 Leak
Posted May 16, 2018

tags | headline, government, usa, data loss, spyware, cia
Senators Pass A Resolution To Restore Net Neutrality
Posted May 16, 2018

tags | headline, government, usa
Hacker Breaches Securus, The Company That Helps Cops Track Phones Across The US
Posted May 16, 2018

tags | headline, hacker, government, privacy, phone, spyware
White House Eliminates Cybersecurity Coordinator Role
Posted May 15, 2018

tags | headline, government, usa
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close