what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Win10 MailCarrier 2.51 Buffer Overflow
Posted Oct 29, 2019
Authored by Dino Covotsos, Lance Biggerstaff

Win10 MailCarrier version 2.51 POP3 User remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 13098e760a816ccb94607e0bf00c0b7ce7100d3be40e32babf503a1307f8b8a4

Related Files

winamp-midi-adv.txt
Posted Sep 10, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Winamp 2.91 uses a default plugin called IN_MIDI.DLL used to play MIDI files. Version 3.01 and below for this plugin lets an attacker execute code by simply setting the "Track data size" value of a MIDI file to 0xffffffff.

tags | advisory
SHA-256 | 2fc9611bfeadcb58fcff68ffdc0d8096baf4de99bb06c1985fae64101ac4c175
win-rpc.txt
Posted Jul 18, 2003
Authored by The Last Stage of Delirium | Site lsd-pl.net

A massive security vulnerability has been discovered in all recent versions of the Microsoft operating systems. There is a buffer overflow vulnerability that exists in an integral component of any Windows operating system, the RPC interface implementing Distributed Component Object Model services, or DCOM, that allows remote attackers to obtain unauthorized access to vulnerable systems.

tags | advisory, remote, overflow
systems | windows
SHA-256 | a2ab7e1ad93e552958685d18447336ec08b35a14099950c3e45ea405d5917eaf
win32sc.h
Posted Apr 10, 2003
Authored by TianXing | Site tianxing.org

Win32 Shellcode Version 1.1 - Supports SHE+ScanMem to get GetProcAddress memory address, bind mode, connect back mode, reuse connect mode, and more.

tags | shellcode
systems | windows
SHA-256 | 5362ba1b4b205e3dbeaca2371bc7f6813b413007491740ae688a645399986d60
win95fuk
Posted Aug 26, 2002

A simple trojan that destroys some of the most

tags | trojan, bbs
SHA-256 | 7367758db3c4d3d9f517282bf77b0f6ba9f4583e291ef35d8bc734da30ef12c4
win95.zip
Posted Aug 26, 2002

Win95 password decryption programs.

tags | bbs
systems | windows
SHA-256 | d283f9ed81acaa5e5edb6fff6ff761544febf5ce1d5b099c231d5db600bcb74a
win2k.lanman.txt
Posted Apr 23, 2002
Authored by Peter Grundl

Windows 2000 microsoft-ds Denial of Service - The default LANMAN registry settings on Windows 2000 could allow a malicious user, with access to TCP port 445 on your Windows 2000, to cause a Denial of Service on Windows 2000 server, advanced server, and processional with SP0, SP1, and SP2. An attack could be something as simple as sending a continuous stream of 10k null chars to TCP port 445.

tags | denial of service, registry, tcp
systems | windows
SHA-256 | 7fe2f78f85a4b46727a496296575d34dab9432bafa9cfa3c252c2610e27d4ae9
win32format.doc
Posted Jan 25, 2002
Authored by David Litchfield | Site atstake.com

Windows 2000 Format String Vulnerabilities - Includes detailed discussion of how format string bugs in fprintf(), vprintf() and sprintf() calls they are created, discovered, and exploited.

tags | paper, vulnerability
systems | windows
SHA-256 | cc470ec4478e27b35f145967b8b7096795122256fa90b4a6e74a53055431fa40
win_2000.telnet.tgz
Posted Sep 15, 2000
Authored by Monti

The Windows 2000 Telnet client can be launched via email or browser and automatically passes NTLM authentication credentials to a telnet server. Proof of concept exploit includes a modified telnet server which causes the w2k telnet client to auto authenticate and prehash-ntlm.c which can be used to launch a dictionary attack against a retrieved hash.

tags | exploit, proof of concept
systems | windows
SHA-256 | 82b52ace068cc6c157c2910a941a5a36a69ebeed844d0b304468d6b56322c0ae
winamp.m3u.txt
Posted Jul 27, 2000
Authored by Pauli Ojanpera

Winamp contains a buffer overflow in its M3U playlist parser. It is possible to execute arbitrary code on a remote computer via a malicious playlist. Proof of concept playlist included.

tags | exploit, remote, overflow, arbitrary, proof of concept
SHA-256 | 9765035f7869f821c9fe0e6fe3c9d6e919118bc1a0033378ca09f8927214f384
win2k.0503
Posted May 5, 2000
Authored by win2k | Site win2000mag.com

Windows 2000 Magazine Security UPDATE, May 3, 2000 - Peek Under the Hood of Distributed Denial of Service Attack Software, Cassandra NNTPServer Subject to Denial of Service Attacks, Cart32 Software Contains Backdoor, News: New Distributed Denial of Service Software Discovered, News: More Derogatory Netscape References, HowTo: Advanced Security in Exchange 2000, Part 1, and more.

tags | denial of service, magazine
systems | windows
SHA-256 | c56e05b025985897ac16ada81bfff5b5f3302bd044d64bd0f26a1a4939f5e4a6
win98-bluescreen.txt
Posted Apr 20, 2000
Authored by RUBINHO

More ways to abuse c|/con/con - In mail with html tags, in normal html, serv-u ftp, and win registry.

tags | exploit, registry
SHA-256 | dbd63bc06595239243344b801d6472325cf936204765a3d9446777ea220235b9
win98-con-lan.txt
Posted Mar 25, 2000
Authored by Toxic Waste

A windows 9x machine that shares any of its files, even read only, can be crashed remotely via the con/con issue.

tags | exploit
systems | windows
SHA-256 | 6b86f48dfa2be6f9382859f493774f77bf590ecb9219b3ea09878d0a6e76489a
win98-con.txt
Posted Mar 4, 2000
Authored by Zoa_Chien

Many Windows programs crash if they access c:/con/con. IE and servU-FTP v 2.4a among others are vulnerable.

tags | exploit
systems | windows
SHA-256 | 2cd855c77217cd1f57738d00c43cc9f132e315b6dc636915255b6653aeb4107a
win98_con_exploit.html
Posted Mar 3, 2000
Authored by Neonlenz | Site mha1.8m.com

Variation of the win98 con exploit that crashes netscape as well.

tags | exploit
systems | windows
SHA-256 | 4a3f63f987618fc0db2707c14a1e6599bbd8c98fa540476b3bc345bbeddca9d7
win2k.install.txt
Posted Feb 18, 2000
Authored by Stephane Aubert

During the installation process of Windows 2000 professionnal anyone can connect to the ADMIN$ share as ADMINISTRATOR whithout any password.

tags | exploit
systems | windows
SHA-256 | 28171d26faf3930c1a79b869e75aa51800e46d3d335d294936646c2ceee5982c
winamp.win98.txt
Posted Jan 7, 2000
Authored by Darkplan | Site indigo.ie

A stack based buffer overflow in Winamp 2.10 for Win 98 has been found. The attack is carried out through .pls files which winamp uses for playlists. This is unnerving as it is a feasible plan to trade playlists on irc during a mp3 trading session with someone. Exploit code included.

tags | exploit, overflow
SHA-256 | a099d3e48b9efa61caaa40bccf35453182eb1f1f5afdb4bfc0b7ad5f10b7e4c3
Win95-Skip.tar
Posted Dec 21, 1999

Win95-Skip.tar

tags | encryption
systems | windows
SHA-256 | 80f2962e16ee22299e5298488a77274a2943f1df25437482625b40fbce8814dd
win_asm.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | a770233e5c87344cdec931cae107c188af1f4fdf8ce7a2b8d2213c3e784e1f03
win32asm.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | 0b1507eaeee630e0d666305f59617ce9dab42039882b01eeba4ac30a0818666f
win95pw.txt
Posted Aug 17, 1999

No information is available for this file.

tags | cracker
SHA-256 | cc8637a38e6e1900d304786c95421668c98bb827f89ddc801f3cf19042cc0695
win95.source.code.htm
Posted Aug 17, 1999

Windows 95 Source Code Revealed

systems | windows, unix
SHA-256 | 7b56fd89f61a5e2932adfd94f483af195009246b2ac908b43780d08e032808f9
win95.upgrade.source.code.htm
Posted Aug 17, 1999

Win95 Upgrade Source Code

systems | windows, unix
SHA-256 | 21f56201b54dd5ddddf0cd71860a508eda9af494416953c076d251c77b8be4cf
win95.vs.jesus.htm
Posted Aug 17, 1999

Windows95 vs. Jesus Christ

systems | unix
SHA-256 | fabac4f0ebf0ee80b370c985172182a69137aaec2f81c72729eaf1a5ecf31ed0
winamp.2.x.bof.txt
Posted Aug 17, 1999

Buffer overflow in the WinAMP Windows sound player allows remote attacker to launch simple denial of service attacks that crash WinAMP.

tags | exploit, remote, denial of service, overflow
systems | windows
SHA-256 | fba27144ec67d704c742b4053217af504fcb6f83072958d7848afbf8c4215156
win98explorer.txt
Posted Aug 17, 1999

Buffer overflow in Windows Explorer can lead to Denial of Service attack, and possibly more.

tags | exploit, denial of service, overflow
systems | windows
SHA-256 | 4214293d27b33ba9bb4f154acf870baa5a5a54e9b95f0a50d46aeaa2d415d028
Page 4 of 4
Back1234Next

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close