Exploit the possiblities
Showing 1 - 25 of 106 RSS Feed

Files

6 Bytes DoS-Badget-Game Shellcode
Posted Apr 15, 2010
Authored by Magnefikko

6 bytes small DoS-Badget-Game shellcode.

tags | shellcode
MD5 | 2175a0ea2479fae266085584f5edd85f
labs2001-01.txt
Posted Mar 16, 2001
Site ussrback.com

USSR Advisory USSR-2001001 - The Windows SSH server (sshd) v2.4 is vulnerable to a denial of service attack. It can not handle more than 64 simultaneous connections. Fixed in v2.5.

tags | denial of service
systems | windows
MD5 | 6f7d2103ddf5cd7250c6dfc9dddf2f19
labs58.txt
Posted Dec 27, 2000
Site ussrback.com

USSR Advisory #58 - The 1st Up Mail Server v4.1 contains a buffer overflow in a long "mail from:" tag which can result in denial of service. Fix available here.

tags | denial of service, overflow
MD5 | c9ef8f54b753f84c0e129653d746aa46
labs57.txt
Posted Nov 6, 2000
Site ussrback.com

USSR Advisory #57 - An buffer overflow vulnerability has been discovered in the Microsoft System Monitor ActiveX control which can be exploited in Internet Explorer, Outlook, or Outlook Express running on Windows 2000. Demonstration available ms00-085 addresses this issue.

tags | overflow, activex
systems | windows, 2k
MD5 | d7992cefd633163d42e975e1578f9cfb
labs56.txt
Posted Oct 31, 2000
Site ussrback.com

USSR Advisory #56 - The Ultraseek search engine v3.1 and 3.1.10 is vulnerable to a denial of service attack on many platforms.

tags | denial of service
MD5 | 53ee69b76056ba21719b37761275acd1
labs55.txt
Posted Oct 19, 2000
Site ussrback.com

USSR Advisory #55 - A buffer overflow has been discovered in HyperTerminal which can cause arbitrary code from a HTML mail message to be executed via a telnet: URL, as described in here.

tags | overflow, arbitrary
MD5 | 78e5e95fd4f4bacc79bc8616c97323e1
labs54.txt
Posted Oct 19, 2000
Site ussrback.com

USSR Advisory #54 - TransSoft's Broker FTP Server versions prior to v4.3.0.1 contains a buffer overflow which results in denial of service. Fix available here.

tags | denial of service, overflow
MD5 | 816250b0fb72f98902f3b0373014f4d0
labs53.txt
Posted Sep 27, 2000
Site ussrback.com

USSR Advisory #53 - Malformed Embedded Windows Media Player 7 "OCX Attachment" Vulnerability. The USSR Team has found a problem in the Windows Media Player 7 ActiveX control, which could be used in a denial of service attack against RTF-enabled e-mail clients such as Outlook 2000 and Outlook Express.

tags | denial of service, activex
systems | windows
MD5 | 06dfbf213f68be2321c46e728d82b239
AnalogX.pl
Posted Sep 6, 2000
Authored by Neon-Lenz

Analogx.pl is a Local / Remote GET Buffer Overflow dos exploit for AnalogX SimpleServer:WWW HTTP Server v1.1. Based on USSR Advisory #29.

tags | remote, web, overflow, local
MD5 | 8c96c7c57e3dffd4c72a43bd2894485b
labs52.clarification
Posted Sep 1, 2000
Site ussrback.com

USSR Advisory #52 - Clarification. To clear up a few comments about USSR Advisory #52. One regarding the DoS against Iris 1.01 "BETA", and the other regarding "in this case Eeye".

MD5 | cd4ba8091e57b1c091ee9009c57be8f6
labs52.txt
Posted Sep 1, 2000
Site ussrback.com

USSR Advisory #52 - The Ussr Team has found a problem in Eeye IRIS 1.01, There is a heap memory buffer overflow in IRIS 1.01 that causes not only this network sniffing program to crash, but also to take system resources up to 100% usage, until it crashes. The vulnerability arises after sending multiple udp connection to random ports on the host that IRIS or SpyNet CaptureNet is running.

tags | overflow, udp
MD5 | 30038b65ebfc2b99bc930cbe5db66655
labs50.txt
Posted Jul 19, 2000
Site ussrback.com

Advisory #50 - An exploitable buffer overflow has been found in all versions of Microsoft Outlook. The vulnerability could enable a malicious sender of an e-mail message with a malformed header to cause and exploit a buffer overrun on a user's machine. The buffer overrun could crash Outlook Express, Outlook e-mail client, or cause arbitrary code to run on the user's machine. The danger in this vulnerability is that the buffer overrun would occur even if the user does not open or preview the e-mail message.

tags | overflow, arbitrary
MD5 | eef7d696c7e59151fd534ff6d409a07d
outoutlook.zip
Posted Jul 19, 2000

Microsoft Outlook remote exploit - Tested on Outlook Express 5.0, Outlook 2000, Outlook 97.0, and Outlook 98. Includes Unix Perl version and windows source / binary. The included shellcode causes the victim computer to visit http://www.ussrback.com.

tags | remote, web, perl, shellcode
systems | windows, unix
MD5 | d5b13a892c0ca5085cae1d74bcd10376
labs49.txt
Posted Jul 11, 2000
Site ussrback.com

USSR Advisory #49 - Remote dos attack in WircSrv IRC Server v5.07s. A malformed request to port 6667 will cause the process containing the services to stop responding. Perl exploit included.

tags | remote, perl
MD5 | d768580e163a042d0003caa8aac51d92
labs48.txt
Posted Jul 4, 2000
Site ussrback.com

LocalWEB HTTP Server v. 1.20 remote dos attack - Sending a malformed URL to port 80 causes a buffer to be overflow resulting in a denial of service. Includes perl exploit.

tags | remote, web, denial of service, overflow, perl
MD5 | 82aeb64543a3df7a40b91f7d9dde6ec0
labs47.txt
Posted Jun 16, 2000
Site ussrback.com

USSR Advisory #47 - Remote dos attack in the Small HTTP Server ver. 1.212. Sending a malformed URL to port 80 will cause the proccess containg the services to stop responding.

tags | remote, web
MD5 | 44029fda905d96308dfd06af397c3bdf
labs46.txt
Posted Jun 16, 2000
Site ussrback.com

USSR Advisory #46 - Remote dos attacks in the Dragon Server v1.00 and v2.00. Long FTP usernames cause the service to crash.

tags | remote
MD5 | a79c978553bedb59e30e4aea3937e0f3
labs45.txt
Posted Jun 15, 2000
Site ussrback.com

USSR Advisory #45 - Remote dos attack in AnalogX SimpleServer v1.05. A malformed URL sent to port 80 will cause the proccess containg the services to stop responding.

tags | remote
MD5 | 4640badf23b187126e9ef620e79752d1
labs44.txt
Posted Jun 15, 2000
Site ussrback.com

USSR Advisory #44 - Network Assosciates PGP Certificate Server v2.5.0 and 2.5.1 for Windows and Solaris has a denial of service vulnerability. Connecting to the PGP Certificate Server Command Port (TCP port 4000 default) from a host without a DNS name causes the process containing the services to crash, causing this message to be displayed.

tags | denial of service, tcp
systems | windows, solaris
MD5 | 937e18d0f36251c2ef932b55b14d5e8d
labs43.txt
Posted Jun 2, 2000
Site ussrback.com

USSR Advisory #43 - Remote dos attack against Real Networks Real Server version 7, 7.01, and G2 1.0. Sending malformed packets to the RealServer HTTP port (default 8080) will cause the service to stop responding. Exploit URL included. Affects Windoows NT/2000, Solaris 2.x, Linux, Irix, Unixware, and FreeBSD.

tags | remote, web
systems | linux, solaris, freebsd, irix, unixware
MD5 | 840b40693ba117badc34d7d40ef574cd
labs42.txt
Posted May 24, 2000
Site ussrback.com

USSR Advisory #42 - HP Web JetAdmin remote denial of service attack. HP Web JetAdmin Version 6.0 for Windows NT / 2000 has a heap overflow. Sending a malformed URL the JetAdmin service which runs on port 8000 will cause it to stop responding.

tags | remote, web, denial of service, overflow
systems | windows, nt
MD5 | c7fd48d073f937695c75cb38c2314d78
labs41.txt
Posted May 24, 2000
Site ussrback.com

USSR Advisory #41 - HP Web JetAdmin web interface server directory traversal vulnerability. HP Web JetAdmin Version 5.6 for Windows NT and 2000 (tcp port 8000) allows an attacker to read any file outside of the intended web-published filesystem directory. Exploit URL included.

tags | web, tcp
systems | windows, nt
MD5 | f3e13959dca7e909eb46e99af864f024
labs40.txt
Posted May 12, 2000
Site ussrback.com

USSR Advisory #40 - Remote DoS attack in Microsoft IIS 4.0 & 5.0 - Malformed Extension Data in URL Vulnerability. The Ussr Labs Team has recently discovered a memory problem in IIS. Performing an attack with specially-malformed information extension data in the URL will cause the server to slow or stop.

tags | remote
MD5 | 8c911dadd41d6460b2a7c67c1ef1db73
labs39.txt
Posted May 2, 2000
Site ussrback.com

USSR Advisory #39 - Remote DoS attack in CASSANDRA NNTPServer v1.10 from ATRIUM SOFTWARE Vulnerability. The Ussr Labs Team has recently discovered a buffer overflow problem in the CASSANDRA NNTPServer v1.0. Performing an attack, with excessive login information on Port 119, can cause the process containg the services to stop responding.

tags | remote, overflow
MD5 | 887d7bd3766599aba5125bbf1c6e856c
labs38.htm
Posted Apr 22, 2000
Site ussrback.com

USSR Advisory #38 - Remote DoS attack in Real Networks Real Server. The Ussr Labs team has recently discovered a memory problem in the RealServer 7 Server. By sending specially-malformed information to port 7070 the proccess containg the service will die.

tags | remote
MD5 | 4bae04fb4a5cfe73a5bb4d570af306ec
Page 1 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close