Win10 MailCarrier version 2.51 POP3 User remote buffer overflow exploit.
13098e760a816ccb94607e0bf00c0b7ce7100d3be40e32babf503a1307f8b8a4
Winamp 2.91 uses a default plugin called IN_MIDI.DLL used to play MIDI files. Version 3.01 and below for this plugin lets an attacker execute code by simply setting the "Track data size" value of a MIDI file to 0xffffffff.
2fc9611bfeadcb58fcff68ffdc0d8096baf4de99bb06c1985fae64101ac4c175
A massive security vulnerability has been discovered in all recent versions of the Microsoft operating systems. There is a buffer overflow vulnerability that exists in an integral component of any Windows operating system, the RPC interface implementing Distributed Component Object Model services, or DCOM, that allows remote attackers to obtain unauthorized access to vulnerable systems.
a2ab7e1ad93e552958685d18447336ec08b35a14099950c3e45ea405d5917eaf
Win32 Shellcode Version 1.1 - Supports SHE+ScanMem to get GetProcAddress memory address, bind mode, connect back mode, reuse connect mode, and more.
5362ba1b4b205e3dbeaca2371bc7f6813b413007491740ae688a645399986d60
A simple trojan that destroys some of the most
7367758db3c4d3d9f517282bf77b0f6ba9f4583e291ef35d8bc734da30ef12c4
Win95 password decryption programs.
d283f9ed81acaa5e5edb6fff6ff761544febf5ce1d5b099c231d5db600bcb74a
Windows 2000 microsoft-ds Denial of Service - The default LANMAN registry settings on Windows 2000 could allow a malicious user, with access to TCP port 445 on your Windows 2000, to cause a Denial of Service on Windows 2000 server, advanced server, and processional with SP0, SP1, and SP2. An attack could be something as simple as sending a continuous stream of 10k null chars to TCP port 445.
7fe2f78f85a4b46727a496296575d34dab9432bafa9cfa3c252c2610e27d4ae9
Windows 2000 Format String Vulnerabilities - Includes detailed discussion of how format string bugs in fprintf(), vprintf() and sprintf() calls they are created, discovered, and exploited.
cc470ec4478e27b35f145967b8b7096795122256fa90b4a6e74a53055431fa40
The Windows 2000 Telnet client can be launched via email or browser and automatically passes NTLM authentication credentials to a telnet server. Proof of concept exploit includes a modified telnet server which causes the w2k telnet client to auto authenticate and prehash-ntlm.c which can be used to launch a dictionary attack against a retrieved hash.
82b52ace068cc6c157c2910a941a5a36a69ebeed844d0b304468d6b56322c0ae
Winamp contains a buffer overflow in its M3U playlist parser. It is possible to execute arbitrary code on a remote computer via a malicious playlist. Proof of concept playlist included.
9765035f7869f821c9fe0e6fe3c9d6e919118bc1a0033378ca09f8927214f384
Windows 2000 Magazine Security UPDATE, May 3, 2000 - Peek Under the Hood of Distributed Denial of Service Attack Software, Cassandra NNTPServer Subject to Denial of Service Attacks, Cart32 Software Contains Backdoor, News: New Distributed Denial of Service Software Discovered, News: More Derogatory Netscape References, HowTo: Advanced Security in Exchange 2000, Part 1, and more.
c56e05b025985897ac16ada81bfff5b5f3302bd044d64bd0f26a1a4939f5e4a6
More ways to abuse c|/con/con - In mail with html tags, in normal html, serv-u ftp, and win registry.
dbd63bc06595239243344b801d6472325cf936204765a3d9446777ea220235b9
A windows 9x machine that shares any of its files, even read only, can be crashed remotely via the con/con issue.
6b86f48dfa2be6f9382859f493774f77bf590ecb9219b3ea09878d0a6e76489a
Many Windows programs crash if they access c:/con/con. IE and servU-FTP v 2.4a among others are vulnerable.
2cd855c77217cd1f57738d00c43cc9f132e315b6dc636915255b6653aeb4107a
Variation of the win98 con exploit that crashes netscape as well.
4a3f63f987618fc0db2707c14a1e6599bbd8c98fa540476b3bc345bbeddca9d7
During the installation process of Windows 2000 professionnal anyone can connect to the ADMIN$ share as ADMINISTRATOR whithout any password.
28171d26faf3930c1a79b869e75aa51800e46d3d335d294936646c2ceee5982c
A stack based buffer overflow in Winamp 2.10 for Win 98 has been found. The attack is carried out through .pls files which winamp uses for playlists. This is unnerving as it is a feasible plan to trade playlists on irc during a mp3 trading session with someone. Exploit code included.
a099d3e48b9efa61caaa40bccf35453182eb1f1f5afdb4bfc0b7ad5f10b7e4c3
Win95-Skip.tar
80f2962e16ee22299e5298488a77274a2943f1df25437482625b40fbce8814dd
No information is available for this file.
a770233e5c87344cdec931cae107c188af1f4fdf8ce7a2b8d2213c3e784e1f03
No information is available for this file.
0b1507eaeee630e0d666305f59617ce9dab42039882b01eeba4ac30a0818666f
No information is available for this file.
cc8637a38e6e1900d304786c95421668c98bb827f89ddc801f3cf19042cc0695
Windows 95 Source Code Revealed
7b56fd89f61a5e2932adfd94f483af195009246b2ac908b43780d08e032808f9
Win95 Upgrade Source Code
21f56201b54dd5ddddf0cd71860a508eda9af494416953c076d251c77b8be4cf
Windows95 vs. Jesus Christ
fabac4f0ebf0ee80b370c985172182a69137aaec2f81c72729eaf1a5ecf31ed0
Buffer overflow in the WinAMP Windows sound player allows remote attacker to launch simple denial of service attacks that crash WinAMP.
fba27144ec67d704c742b4053217af504fcb6f83072958d7848afbf8c4215156
Buffer overflow in Windows Explorer can lead to Denial of Service attack, and possibly more.
4214293d27b33ba9bb4f154acf870baa5a5a54e9b95f0a50d46aeaa2d415d028