exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 106 RSS Feed

Files

fondo_ussr2.jpg
Posted Feb 9, 2000

fondo_ussr2.jpg

SHA-256 | 8f5dd29a9c917c8f957b05d144fe8132920765251312c4a8a3c07626380076e5
Labs.html
Posted Feb 9, 2000

USSR Advisory #1 - MSN Messenger Service 1.0 uses very weak encryption. Program to break it included.

SHA-256 | d2d0da9d6bf13f605e8b7bf59b9f0ee1a2b10fa10b2e99ce5be7b63e91aa9e44
labs10.html
Posted Feb 9, 2000

USSR Advisory #10 - Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server Vulnerability. UssrLabs found a Local/Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server. The buffer overflow is caused by a long user name / password, 2000 characters, and the re-connection to the Ftp Server.

tags | remote, overflow, local
SHA-256 | 48cdb8c6c94cae0b517c9e90e1495f77b280ae2923c47b164fdd6f6458f53786
labs11.html
Posted Feb 9, 2000

USSR Advisory #11 - Multiple Remote DoS vulnerability in Artisoft XtraMail v1.11 Vulnerability. UssrLabs found multiple places in XtraMail v1.11 where they do not use proper bounds checking. The following all result in a Denial of Service against the service in question.

tags | remote, denial of service
SHA-256 | 2d38875f3bfd24e37ce26327f2e95ff06223873bbd2143ae18a596a0d77161bf
labs12.html
Posted Feb 9, 2000

USSR Advisory #12 - Remote D.o.S Attack in G6 FTP Server v2.0 (beta 4/5) Vulnerability. ssrLabs found a Local/Remote DoS Attack in G6 FTP Server v2.0 (beta 4/5), The buffer overflow is caused by a long user name, 2000 characters.,The G6FTP start to do infinites loops in the main program, and start eating all memory and all computer resource CPU 100%, at the moment of no more memory, if this happend ALL System is down.

tags | remote, overflow, local
SHA-256 | d22602f669d8a2c8e997b950469633fc1eb92df0eeeda233e74e10901a53e2e2
labs13.html
Posted Feb 9, 2000

USSR Advisory #13 - Remote D.o.S Attack in ZetaMail 2.1 Mail POP3/SMTP Server Vulnerability. UssrLabs found a Local/Remote DoS Attack in ZetaMail 2.1 Mail POP3/SMTP Server. The buffer overflow is caused by a long user name/password, 3500 characters.

tags | remote, overflow, local
SHA-256 | df87d78a6afab7c54be211b26687dd3d37692ca3ad9981166226660886fb097e
labs14.html
Posted Feb 9, 2000

USSR Advisory #14 - Remote DoS Attack in Vermillion FTP Daemon (VFTPD) v1.23 Vulnerability. UssrLabs found a Local/Remote DoS Attack in Vermillion FTP Daemon (VFTPD) v1.23, The buffer overflow is caused by a 3 times long cwd, 504 characters.

tags | remote, overflow, local
SHA-256 | 0a9dbc77cedb76ebf4c5a2cf598b48bd696491ad61743138e801228d6aaeb8b5
labs15.html
Posted Feb 9, 2000

USSR Advisory #15 - Multiples Remotes DoS Attacks in MDaemon Server v2.8.5.0 Vulnerability. UssrLabs found multiple places in MDaemon v2.8.5.0 where they do not use proper bounds checking. The following all result in a Denial of Service against the service in question. Afected services: WorldClient: Port 2000 WebConfig : Port 2002. This two remotes services are afected to overflow of you send a large url name.

tags | remote, denial of service, overflow
SHA-256 | ad1236aae0e74023dd8517250cf69e533fad1ce606aa5c5480e863cd621f5ce5
labs16.html
Posted Feb 9, 2000

USSR Advisory #16 - Remote DoS Attack in BisonWare FTP Server V3.5 Vulnerability. UssrLabs found a Local/Remote DoS Attack in BisonWare FTP Server V3.5. The buffer overflow is caused by a long user name, 2000 characters.

tags | remote, overflow, local
SHA-256 | 306e2afae084de1154abe01af8e73e2263e022d554b818587224cd18cda03bd4
labs17.html
Posted Feb 9, 2000

USSR Advisory #17 - Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability. UssrLabs found a Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability Using the string '../' in a URL, an attacker can gain read access to any file outside of the intended web-published filesystem directory.

tags | web
SHA-256 | 2247efb7567305f9b3f50ddf74814db5596118e77f0cbe037ea0fc1541e52c52
labs18.html
Posted Feb 9, 2000

USSR Advisory #18 - Remote DoS Attack in Serv-U FTP-Server v2.5a Vulnerability

tags | remote
SHA-256 | 2e6573fbf99c2d477c2a04c94087b819418c4d258fc5b9ca92b97de7ef3b31eb
labs19.html
Posted Feb 9, 2000

USSR Advisory #19 - Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability

tags | remote
SHA-256 | ea5d1c9d3c235695ef98e001b1c11037b99351027dbd18f9cb4a107191b09182
Labs2.html
Posted Feb 9, 2000

USSR Advisory #2 - WFTPD v2.40 FTPServer remotely exploitable buffer overflow vulnerability. We found in the WFTPD v2.34,v2.40 server and earlier a vulnerable to remotely exploitable buffer overflow. This can result in a denial of service and at worst in arbitrary code being executed on the system.

tags | denial of service, overflow, arbitrary
SHA-256 | 4dd34fc6c1616e7d27489046a0b6a07f8702281ba9bfbff756cc6acbb5bf85c7
labs20.html
Posted Feb 9, 2000

USSR Advisory #20 - Microsoft Internet Explorer 4.x 5.x - Frame Loop Vulnerability

SHA-256 | f65d575ea295693700bcd7b87e14bfa0928b1dfe4a1c52d060ad932f4fb6cd1b
labs21.html
Posted Feb 9, 2000

USSR Advisory #21 - Local / Remote D.o.S Attack in War FTP Daemon 1.70 Vulnerability

tags | remote, local
SHA-256 | 01c4afd1431fb18ba00caeba3c177717956be74f8fbaed6adb725bd2efb1214e
labs22.html
Posted Feb 9, 2000

USSR Advisory #22 - Infoseek Ultraseek 3.1 Remote Buffer Overflow

tags | remote, overflow
SHA-256 | 66c91abea6577b9b9bd9eb0ccbe5010e097cd9aa768aca747787b3a092b4de89
labs24.html
Posted Feb 9, 2000

USSR Advisory #24 - Local / Remote GET Buffer Overflow Vulnerability in ZBServer 1.5 Pro Edition for Win98/NT

tags | remote, overflow, local
systems | windows
SHA-256 | 4b7d011c8bfff0b9a74d315800d9f00e377f636888507350428755f2d7baffb3
labs25.html
Posted Feb 9, 2000

USSR Advisory #25 - Rover POP3 Server V1.1 NT From aVirt and possibly others versions.

SHA-256 | 3de8930a8b1fcd7c7623c803c0ba6831ea1a9b778ae6f8b2751c8625aade8e6d
labs26.html
Posted Feb 9, 2000

USSR Advisory #26 - Local / Remote D.o.S Attack in Savant Web Server V2.0 WIN9X / NT / 2K

tags | remote, web, local
systems | windows
SHA-256 | 7c067f397bc18a0787b106aaba2e30463c3e8dc6fe3657a0ab4ed2d6dd898a80
labs27.html
Posted Feb 9, 2000

USSR Advisory #27 - Local / Remote D.o.S Attack in CSM Mail Server for Windows 95/NT v.2000.08.A

tags | remote, local
systems | windows
SHA-256 | a92cd9743c027d3a59ca1e02bc2eed0622a0cdb5bfaa6b7d24f494be50ce0147
labs28.html
Posted Feb 9, 2000

USSR Advisory #28 - Local / Remote GET Buffer Overflow Vulnerability in CamShot WebCam HTTP Server v2.5 for Win9x/NT

tags | remote, web, overflow, local
systems | windows
SHA-256 | 9ac12878c75f8ba8517bccd76346f52ca67e337889af2d00b83b7412c05c36e8
labs29.html
Posted Feb 9, 2000

USSR Advisory #29 - Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1

tags | remote, web, overflow, local
SHA-256 | 1d9a1bf0fc83833fa611354d1684929cc485da46fcb6db196fb9c089f9f43fbe
Labs3.html
Posted Feb 9, 2000

USSR Advisory #3 - ExpressFS 2.x FTPServer remotely exploitable buffer overflow vulnerability. We found in the ExpressFS 2.x FTP Server and earlier a vulnerable to remotely exploitable bufferoverflow. This can result in a denial of service and at worst in arbitrary code being executed on the system. The vulnerabilities are the conjunction of one long user name ,and another command in this case PASS, If this long command are passed in order program crash.

tags | denial of service, overflow, arbitrary, vulnerability
SHA-256 | 12b3aef634ee8434b28625ed97f4971944f68de4ea98af89495b7b723cf2d255
labs30.html
Posted Feb 9, 2000

USSR Advisory #30 - Local / Remote D.o.S Attack in IMail IMONITOR Server for WinNT Version 5.08

tags | remote, local
systems | windows
SHA-256 | 365af4cc576ecb3056ca0c5bc60341711f83beeb9e105bae28bac4f93707eafd
labs31.html
Posted Feb 9, 2000

USSR Advisory #31 - Local / Remote D.o.S Attack in Super Mail Transfer Package (SMTP) Server for WinNT Version 1.9x

tags | remote, local
systems | windows
SHA-256 | 857a05eb3940804ee398c51762b619c7f780298ab6a92478f29b105c6dbd95ae
Page 3 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close