All Hot News Popular Media
Windows 9x Operating System, PacketStorm Security

Tue, 27 Aug 2013 23:59:52 GMT
Windows OLE Automation Array Remote Code Execution
This Metasploit module exploits the Windows OLE automation array remote code execution vulnerability. The vulnerability exists in Internet Explorer 3.0 until version 11 within Windows 95 up to Windows 10.

Tue, 27 Aug 2013 23:58:22 GMT
Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify()
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.

Mon, 19 Aug 2013 23:33:00 GMT
Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

Mon, 19 Aug 2013 23:28:12 GMT
Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify()
The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.

Wed, 14 Aug 2013 03:12:44 GMT
Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow
The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

Wed, 14 Aug 2013 02:59:49 GMT
Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify()
The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.

Mon, 12 Aug 2013 04:34:58 GMT
Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow
The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

Mon, 12 Aug 2013 04:11:58 GMT
Packet Storm Advisory 2013-0811-1 - Oracle Java storeImageArray()
Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program.

Fri, 05 Jul 2013 09:22:22 GMT
Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution
Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

Wed, 16 Nov 2011 03:57:26 GMT
Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack
Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included.

Mon, 21 May 2007 04:12:58 GMT
libdvdcss 1.2.11
libdvdcss is a cross-platform library for transparent DVD device access with on-the-fly CSS decryption. It currently runs under Linux, FreeBSD, NetBSD, OpenBSD, BSD/OS, Solaris, BeOS, Win95/Win98, Win2k/WinXP, MacOS X, HP-UX, QNX, and OS/2. It is used by libdvdread and most DVD players such as VLC because of its portability and because, unlike similar libraries, it does not require your DVD drive to be region locked.

Mon, 21 May 2007 04:12:41 GMT
udpflood-v1.0.zip
UDP Flooder for Windows 95 and above. It can send udp packets with a user specified data, source and destination port. Includes Delphi source code.

Mon, 21 May 2007 04:12:33 GMT
pingflood-v1.0.zip
An ICMP Type 8 (ping) flooder for Windows 95 and above. Includes Delphi source code.

Thu, 04 Jan 2007 04:02:20 GMT
igmpbomb-v1.4.zip
This program sends oversized IGMP packets. This causes bluescreens and crashes Windows 98 boxes. Works with winsock2 (Windows 98 and above). Includes Delphi source code.

Wed, 19 Apr 2006 22:00:17 GMT
genie_v17.zip
Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.7. Archive password is set to p4ssw0rd. Use at your own risk.

Wed, 08 Mar 2006 05:43:51 GMT
genie_v151.zip
Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.5.1 Archive password is set to p4ssw0rd. Use at your own risk.

Wed, 22 Feb 2006 20:32:33 GMT
genie_v14.zip
Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.4 Archive password is set to p4ssw0rd. Use at your own risk.

Sun, 29 Jan 2006 21:32:21 GMT
genie_v13.zip
Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.3 Archive password is set to p4ssw0rd. Use at your own risk.

Fri, 05 Nov 2004 04:03:50 GMT
genie.zip
Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Archive password is set to p4ssw0rd. Use at your own risk.

Wed, 14 Jul 2004 15:36:00 GMT
urlSpoofMSIE.txt
There is a security bug in Microsoft Internet Explorer, which allows to show any faked target-address in the status bar of the window. Tested in Microsoft Internet Explorer 6 SP1 (6.0.2800.1106) with all patches installed on Windows 98.

Wed, 09 Jun 2004 05:12:48 GMT
HtmlHelpchm.txt
The HtmlHelp application (hh.exe) in Microsoft windows read a value from a .CHM file to set a length parameter. By setting this to a large value, it is possible to overwrite sections of the heap with attacker supplied values. Affected software includes: Microsoft Windows 98, 98SE, ME, Microsoft Windows NT 4.0, Microsoft Windows 2000 Service Pack 4, Microsoft Windows XP, Microsoft Windows XP Service Pack 1, Microsoft Windows Server 2003.

Sun, 09 May 2004 19:33:15 GMT
CYSA-0329.txt
Cyrillium Security Advisory CYSA-0329 - FoolProof Security 3.9.x for Windows 98/98SE/Me has a vulnerability in the password recovery functionality that allows an attacker to recover the Administrator password using the Control password and password recovery key. Exploit included.

Wed, 04 Feb 2004 20:03:00 GMT
WFBE.txt
Write up detailing how to defeat file browsing restrictions on Windows 98 running Novell 3.2.0.0.

Sun, 14 Dec 2003 22:46:32 GMT
typsoft110.txt
TYPSoft FTP Server 1.10 for Windows 9X and WinNT is vulnerable to a denial of service attack when a blank username is supplied.


rec16lx.zip
REC is a portable reverse engineering decompiler which reads an executable file and attempts to produce a C-like representation of the code and data used to build it. It can decompile 386, 68k, PowerPC, and MIPS R3000 programs and recognizes the following file formats: ELF (System V Rel. 4, e.g. Linux, Solaris, etc.), COFF (System V Rel. 3.x, e.g. SCO), PE (Win32 .EXE and .DLL for Microsoft Windows 95 and NT), AOUT (BSD derivatives, e.g. SunOS 4.x), Playstation PS-X (MIPS target only), and raw binary data (via .cmd files).
view page: 152

Shop New Arrivals in Men's Fashion

Start: 07 Sep 2017 | End: 13 Apr 2018

Free Shipping on Orders $500 or More at DroneNerds.com!

Start: 03 Oct 2017 | End: 30 Apr 2018

Beach time essential - beach throw. We offer over 300 different styles, up 70% OFF, enjoy extra 35-4,50-6,80-9,100-12 with “RGFUN”. FREE SHIPPING WORLDWIDE.

Code: RGFUN

Start: 15 May 2017 | End: 06 May 2018

Search All Amazon* UK* DE* FR* JP* CA* CN* IT* ES* IN* BR* MX
Booking.com B.V. is based in Amsterdam in the Netherlands. Ready for some statistics? Our 1,534,024 properties, including 860,482 holiday rentals, are located in 123,105 destinations in 229 countries and territories, and are supported internationally by 198 offices in 70 countries.
2013 Copyright © Techhap.com Mobile version 2015 | PeterLife & company
Skimlinks helps publishers monetize editorial content through automated affiliate links for products.
Terms of use Link at is mandatory if site materials are using fully or particulary.
Were treated to the site administrator, a cup of coffee *https://paypal.me/peterlife
Yandex.ru