exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 106 RSS Feed

Files

6 Bytes DoS-Badget-Game Shellcode
Posted Apr 15, 2010
Authored by Magnefikko

6 bytes small DoS-Badget-Game shellcode.

tags | shellcode
SHA-256 | 262d1ce51e806c472bbaf0a41a2e35372d81549352c88f2f96f00277f2085d44
labs2001-01.txt
Posted Mar 16, 2001
Site ussrback.com

USSR Advisory USSR-2001001 - The Windows SSH server (sshd) v2.4 is vulnerable to a denial of service attack. It can not handle more than 64 simultaneous connections. Fixed in v2.5.

tags | denial of service
systems | windows
SHA-256 | 3bdcb948c7b107ba1452c0a142cd268be0238e2a66b1e53cfb568e358b5c21ed
labs58.txt
Posted Dec 27, 2000
Site ussrback.com

USSR Advisory #58 - The 1st Up Mail Server v4.1 contains a buffer overflow in a long "mail from:" tag which can result in denial of service. Fix available here.

tags | denial of service, overflow
SHA-256 | b3f2abaf7829914bb59b16a6596355c2829b25a197a106b1184540398916f867
labs57.txt
Posted Nov 6, 2000
Site ussrback.com

USSR Advisory #57 - An buffer overflow vulnerability has been discovered in the Microsoft System Monitor ActiveX control which can be exploited in Internet Explorer, Outlook, or Outlook Express running on Windows 2000. Demonstration available ms00-085 addresses this issue.

tags | overflow, activex
systems | windows
SHA-256 | c71292dab678f51dff02c9fab692eea15a88b7bff9c00d978d2b4b25d8893ba2
labs56.txt
Posted Oct 31, 2000
Site ussrback.com

USSR Advisory #56 - The Ultraseek search engine v3.1 and 3.1.10 is vulnerable to a denial of service attack on many platforms.

tags | denial of service
SHA-256 | 90c4e91688a86ece22a4ad94f1018be2229bf35b7ed5ded7017f91face078428
labs55.txt
Posted Oct 19, 2000
Site ussrback.com

USSR Advisory #55 - A buffer overflow has been discovered in HyperTerminal which can cause arbitrary code from a HTML mail message to be executed via a telnet: URL, as described in here.

tags | overflow, arbitrary
SHA-256 | 85ca8996cd03accb38cdecb208c7ce2df6f76e5c8106f0d4a14a2bdfa8b528fc
labs54.txt
Posted Oct 19, 2000
Site ussrback.com

USSR Advisory #54 - TransSoft's Broker FTP Server versions prior to v4.3.0.1 contains a buffer overflow which results in denial of service. Fix available here.

tags | denial of service, overflow
SHA-256 | f9f7ee2052ff2f54cc841d28d2c8aeb4d677ca0e0a287718e145b7322f9a35f3
labs53.txt
Posted Sep 27, 2000
Site ussrback.com

USSR Advisory #53 - Malformed Embedded Windows Media Player 7 "OCX Attachment" Vulnerability. The USSR Team has found a problem in the Windows Media Player 7 ActiveX control, which could be used in a denial of service attack against RTF-enabled e-mail clients such as Outlook 2000 and Outlook Express.

tags | denial of service, activex
systems | windows
SHA-256 | 6887a0efab15dca3948af2af037e0e47e29102b12b701b773f27ea873ae55235
AnalogX.pl
Posted Sep 6, 2000
Authored by Neon-Lenz

Analogx.pl is a Local / Remote GET Buffer Overflow dos exploit for AnalogX SimpleServer:WWW HTTP Server v1.1. Based on USSR Advisory #29.

tags | remote, web, overflow, local
SHA-256 | 7d7de8059e1c6adceb81388daff0a69a02756f41bab2fe06c96453c7db47e64d
labs52.clarification
Posted Sep 1, 2000
Site ussrback.com

USSR Advisory #52 - Clarification. To clear up a few comments about USSR Advisory #52. One regarding the DoS against Iris 1.01 "BETA", and the other regarding "in this case Eeye".

SHA-256 | d896e26836e7ab23f58fb1922907ce3ec2c70631df59172b191a984429cad68d
labs52.txt
Posted Sep 1, 2000
Site ussrback.com

USSR Advisory #52 - The Ussr Team has found a problem in Eeye IRIS 1.01, There is a heap memory buffer overflow in IRIS 1.01 that causes not only this network sniffing program to crash, but also to take system resources up to 100% usage, until it crashes. The vulnerability arises after sending multiple udp connection to random ports on the host that IRIS or SpyNet CaptureNet is running.

tags | overflow, udp
SHA-256 | e25834b44f953097671edf9008a232d79595b71f52b4a93e91e5a6cea8335b80
labs50.txt
Posted Jul 19, 2000
Site ussrback.com

Advisory #50 - An exploitable buffer overflow has been found in all versions of Microsoft Outlook. The vulnerability could enable a malicious sender of an e-mail message with a malformed header to cause and exploit a buffer overrun on a user's machine. The buffer overrun could crash Outlook Express, Outlook e-mail client, or cause arbitrary code to run on the user's machine. The danger in this vulnerability is that the buffer overrun would occur even if the user does not open or preview the e-mail message.

tags | overflow, arbitrary
SHA-256 | 3ac1c77969b0584ae303da959fdb8a320f93d58dd3415315da364ebff37b560f
outoutlook.zip
Posted Jul 19, 2000

Microsoft Outlook remote exploit - Tested on Outlook Express 5.0, Outlook 2000, Outlook 97.0, and Outlook 98. Includes Unix Perl version and windows source / binary. The included shellcode causes the victim computer to visit http://www.ussrback.com.

tags | remote, web, perl, shellcode
systems | windows, unix
SHA-256 | 085dddfa2bd4ab473d84d0b82e4c65819d4e26e0cd1c0a68942ef5f759e74c63
labs49.txt
Posted Jul 11, 2000
Site ussrback.com

USSR Advisory #49 - Remote dos attack in WircSrv IRC Server v5.07s. A malformed request to port 6667 will cause the process containing the services to stop responding. Perl exploit included.

tags | remote, perl
SHA-256 | 13303391f835c6789364aea5ef86c6437027941108d6dd76e4c6544d203aca95
labs48.txt
Posted Jul 4, 2000
Site ussrback.com

LocalWEB HTTP Server v. 1.20 remote dos attack - Sending a malformed URL to port 80 causes a buffer to be overflow resulting in a denial of service. Includes perl exploit.

tags | remote, web, denial of service, overflow, perl
SHA-256 | ae66ac0f9d4486258392b6e5e9de670cd146472dcf0dbc59417ba7cdc6d2c386
labs47.txt
Posted Jun 16, 2000
Site ussrback.com

USSR Advisory #47 - Remote dos attack in the Small HTTP Server ver. 1.212. Sending a malformed URL to port 80 will cause the proccess containg the services to stop responding.

tags | remote, web
SHA-256 | 86a55c2c873fe77149e6c2e21526691e7d5454b7fa64b69715c91a5e13aad66f
labs46.txt
Posted Jun 16, 2000
Site ussrback.com

USSR Advisory #46 - Remote dos attacks in the Dragon Server v1.00 and v2.00. Long FTP usernames cause the service to crash.

tags | remote
SHA-256 | 761380a3626c3a294a00311b17cecc743df14fa38155757666882760a5209070
labs45.txt
Posted Jun 15, 2000
Site ussrback.com

USSR Advisory #45 - Remote dos attack in AnalogX SimpleServer v1.05. A malformed URL sent to port 80 will cause the proccess containg the services to stop responding.

tags | remote
SHA-256 | 5962cde8e9d34724c1d71bd9e3e0f7186e0f0a721c66586118c3c2b09ae04656
labs44.txt
Posted Jun 15, 2000
Site ussrback.com

USSR Advisory #44 - Network Assosciates PGP Certificate Server v2.5.0 and 2.5.1 for Windows and Solaris has a denial of service vulnerability. Connecting to the PGP Certificate Server Command Port (TCP port 4000 default) from a host without a DNS name causes the process containing the services to crash, causing this message to be displayed.

tags | denial of service, tcp
systems | windows, solaris
SHA-256 | d8f6c5c712c8c416b7760116ec2405ed9995450f003309fb981e30e00014ce47
labs43.txt
Posted Jun 2, 2000
Site ussrback.com

USSR Advisory #43 - Remote dos attack against Real Networks Real Server version 7, 7.01, and G2 1.0. Sending malformed packets to the RealServer HTTP port (default 8080) will cause the service to stop responding. Exploit URL included. Affects Windoows NT/2000, Solaris 2.x, Linux, Irix, Unixware, and FreeBSD.

tags | remote, web
systems | linux, solaris, freebsd, irix, unixware
SHA-256 | fb3235de31d91f9fe6c72377f127e585ee0a820398fcdfdb7ff9898b18eeb010
labs42.txt
Posted May 24, 2000
Site ussrback.com

USSR Advisory #42 - HP Web JetAdmin remote denial of service attack. HP Web JetAdmin Version 6.0 for Windows NT / 2000 has a heap overflow. Sending a malformed URL the JetAdmin service which runs on port 8000 will cause it to stop responding.

tags | remote, web, denial of service, overflow
systems | windows
SHA-256 | b4251729211b04a255d527fe18341e1736747e209fc075c277e456f5b72bec0c
labs41.txt
Posted May 24, 2000
Site ussrback.com

USSR Advisory #41 - HP Web JetAdmin web interface server directory traversal vulnerability. HP Web JetAdmin Version 5.6 for Windows NT and 2000 (tcp port 8000) allows an attacker to read any file outside of the intended web-published filesystem directory. Exploit URL included.

tags | web, tcp
systems | windows
SHA-256 | 34a2c44b058e084b3e456e3f6fa27bcde80cc025fec19e5da65ab6189b9027a1
labs40.txt
Posted May 12, 2000
Site ussrback.com

USSR Advisory #40 - Remote DoS attack in Microsoft IIS 4.0 & 5.0 - Malformed Extension Data in URL Vulnerability. The Ussr Labs Team has recently discovered a memory problem in IIS. Performing an attack with specially-malformed information extension data in the URL will cause the server to slow or stop.

tags | remote
SHA-256 | 3ad2790a2aa9da5a9e68e4f05873fcf34d29c2e12efbfb4acaed60e374f2d48d
labs39.txt
Posted May 2, 2000
Site ussrback.com

USSR Advisory #39 - Remote DoS attack in CASSANDRA NNTPServer v1.10 from ATRIUM SOFTWARE Vulnerability. The Ussr Labs Team has recently discovered a buffer overflow problem in the CASSANDRA NNTPServer v1.0. Performing an attack, with excessive login information on Port 119, can cause the process containg the services to stop responding.

tags | remote, overflow
SHA-256 | 17a506747b2a9826304107dde7d83dac57c212fd345197f859dcc3e40633fb0b
labs38.htm
Posted Apr 22, 2000
Site ussrback.com

USSR Advisory #38 - Remote DoS attack in Real Networks Real Server. The Ussr Labs team has recently discovered a memory problem in the RealServer 7 Server. By sending specially-malformed information to port 7070 the proccess containg the service will die.

tags | remote
SHA-256 | 767c71c7cc59bbd6cb2d7075cf31625110e4ad3bfc58b5529615f609cce8ae9c
Page 1 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close