what you don't know can hurt you
Showing 1 - 25 of 41 RSS Feed

Files from Underground Security Systems Research

First Active1999-10-21
Last Active2000-02-24
labs34.htm
Posted Feb 24, 2000
Authored by Underground Security Systems Research

USSR Advisory #34 - Local/Remote D.o.S Attack in InterAccess Telnet Server Release 4.0 (All Builds) Windows95/98/WinNT. The code that handles the Terminal client configurations to the Telnet server in the connection procedure contains a buffer overflow, causing Telnetd to crash.

tags | remote, overflow, local
systems | windows
MD5 | bb5bc854bda426299e0c6345acc7fe8c
dostelnetd.exe
Posted Feb 9, 2000
Authored by Underground Security Systems Research

InterAccess Telnet Server Release 4.0 DoS exploit - Windows executable.

systems | windows
MD5 | 7019cce14f26c3809e74407624a8d7cf
dostelnetd.zip
Posted Feb 9, 2000
Authored by Underground Security Systems Research

InterAccess Telnet Server Release 4.0 DoS exploit - Windows source code.

systems | windows
MD5 | 21be79e8d0e15b85a060de721f1badba
labs33.html
Posted Feb 9, 2000
Authored by Underground Security Systems Research

USSR Advisory #33 - InterAccess Telnetd 4.0 for Windows NT has a remotely exploitable buffer overflow at the login: prompt.

tags | overflow
systems | windows, nt
MD5 | 563425a9ee8f3aa7803c5df7743d05b6
SHGetPathFromIDList.txt
Posted Feb 4, 2000
Authored by Underground Security Systems Research

Windows Api SHGetPathFromIDList Buffer Overflow - All Structure lengths, or Length of string, can be a modified or altered and cause whatever handles the shortcuts to crash.

tags | exploit, overflow
systems | windows
MD5 | a3a29cb02126932cf421ecfb3aa2942c
serv-u.25b.txt
Posted Feb 4, 2000
Authored by Underground Security Systems Research

Serv-u FTP-Server v2.5b for Win9x/WinNTFTP-Server v2.5b will crash if you upload a malformed link file and type the ftp command LIST, due to overflow in Windows API SHGetPathFromIDList.

tags | exploit, overflow
systems | windows, 9x
MD5 | f0259e7812e7f973d7dc26e04e04b040
supermail.nt.txt
Posted Jan 13, 2000
Authored by Underground Security Systems Research

A memory leak exists in the Super Mail Transfer Package for Windows NT that may cause an NT host to stop functioning and/or need to be rebooted. DoS exploit description included.

tags | exploit, memory leak
systems | windows, nt
MD5 | 1f323c42a552bfecf7ec058be4736b63
imonitor.txt
Posted Jan 7, 2000
Authored by Underground Security Systems Research

Local / Remote D.o.S vulnerability has been discovered in IMail IMONITOR Server for WinNT Version 5.08. The status.cgi script takes up too much CPU time, if you run status.cgi lots of times, the server will crash.

tags | exploit, remote, local, cgi
systems | windows
MD5 | 8dad027ca19cadb9d2e4b31e5a502d5f
analogx.www.txt
Posted Jan 2, 2000
Authored by Underground Security Systems Research

Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1. Windows 95 is confirmed vulnerable, possibly other platforms.

tags | exploit, remote, web, overflow, local
systems | windows, 9x
MD5 | bfcb87fe0f3a982d6ba231788b36c004
savant.dos.txt
Posted Dec 31, 1999
Authored by Underground Security Systems Research

The Savant Web Server V2.0 Win9X / NT / 2K and possibly other versions has a buffer overflow caused by a NULL Character in the parsing Get Command routine.

tags | exploit, web, overflow
systems | windows
MD5 | 37c609c30feae7aea4e588a1b42dfc9f
csm.dos.txt
Posted Dec 31, 1999
Authored by Underground Security Systems Research

Local / Remote D.o.S Attack in CSM Mail Server for Windows 95/NT v.2000.08.A and other older versions. Possibly exploitable.

tags | exploit, remote, local
systems | windows, 9x
MD5 | 884e327248c64268b3d38a83f6df6395
camshot.overflow.txt
Posted Dec 31, 1999
Authored by Underground Security Systems Research

CamShot is a Windows 95/98/NT web server that serves up web pages containing time stamped images captured from a video camera. The images can be viewed from anywhere on the network with a web browser. UssrLabs found a Local / Remote Buffer overflow, The code that handles GET commands has an unchecked buffer that will allow arbitrary code to be executed if it is overflowed.

tags | exploit, remote, web, overflow, arbitrary, local
systems | windows, 9x
MD5 | d69851af4fe78c129d5c6e50d73308cf
roverpop3.dos.txt
Posted Dec 28, 1999
Authored by Underground Security Systems Research

Local / Remote Remote DoS Attack in Rover POP3 Server V1.1 NT From aVirt. Source / Binary for exploit here.

tags | exploit, remote, local
MD5 | 38e52c5c3607f0cd918cfd6604e7b858
zbs15exp.zip
Posted Dec 24, 1999
Authored by Underground Security Systems Research

Remote exploit for ZBServer 1.5 Pro Edition for Win98/NT. Source code. Binary available here.

tags | exploit, remote
systems | windows
MD5 | 65ebf12ae6f7c64fbe4f59b31d967299
zbserver-1.5.txt
Posted Dec 24, 1999
Authored by Underground Security Systems Research

[w00giving #11] An exploitable buffer overflow was found in ZBServer 1.5 Pro Edition for Win98/NT. The code that handles GET commands has an unchecked buffer that will allow arbitrary code to be executed if it is overflowed. Source / Binary for the exploit available here.

tags | exploit, overflow, arbitrary
systems | windows
MD5 | a06e657a5b2fed874e163f0081266eeb
dns-pro.dos.txt
Posted Dec 21, 1999
Authored by Underground Security Systems Research

Remote DoS attack discovered in DNS Pro 5.7 for Windows NT, caused by over 30 connections to port 53 at the same time.

tags | exploit, remote, denial of service
systems | windows, nt
MD5 | 99df5cc1dd61bba111e3876cea3acb6a
ultraseek.remote.txt
Posted Dec 16, 1999
Authored by Underground Security Systems Research

Infoseek Ultraseek 3.1 for NT contains an exploitable remote buffer overflow. Versions 2.1 through 3.1 are confirmed vulnerable. Patch available here.

tags | exploit, remote, overflow
MD5 | d448c63f0dbd3925b86b67e39247a696
warftp.dos.txt
Posted Dec 14, 1999
Authored by Underground Security Systems Research

UssrLabs found a Local/Remote DoS Attack in War FTP Daemon 1.70 the buffer overflow is caused by a Multiple connections at the same time.

tags | exploit, remote, overflow, local
MD5 | 1fa2b0fdb03f7a59fd456c4d5542e6c2
ie.frameloop.txt
Posted Dec 9, 1999
Authored by Underground Security Systems Research

Microsoft Internet Explorer 4.x and 5.x - Frame Loop Vulnerability. By creating an endless loop of frames, it is possible to create a malicious webpage that when visited by an IE user all of their system resources are devoured and depending on the system its probable that the machine will crash and reboot itself. Exploit code included.

tags | exploit
MD5 | a7788b4d0249eb17375d1a6adcbbc8e0
goodtech.telnet.dos.txt
Posted Dec 6, 1999
Authored by Underground Security Systems Research

UssrLabs found a Remote DoS Attack in GoodTech Telnet Server NT v2.2.1, the buffer overflow is caused by a long user name of 23870 characters.

tags | exploit, remote, overflow
MD5 | f6136542409d03d377475544ed42a85b
mailgear-1.0.txt
Posted Nov 29, 1999
Authored by Underground Security Systems Research

Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability. Example included.

tags | exploit, web
MD5 | eb91520100b44195cf2c486b42fae145
bisonware.ftp.3.5.txt
Posted Nov 25, 1999
Authored by Underground Security Systems Research

UssrLabs found a Local/Remote DoS Attack in BisonWare FTP Server V3.5. The buffer overflow is caused by a long user name, 2000 characters. Source / Binary for DoS attack here.

tags | exploit, remote, overflow, local
MD5 | 8e7b88c4be31f6623cb5265d9376ee13
worldclient.2.0.0.0.dos.txt
Posted Nov 25, 1999
Authored by Underground Security Systems Research

UssrLabs found a buffer overflow in WorldClient Server v2.0.0.0 where they do not use proper bounds checking on WorldClient TCP Port 2000. Denial of service exploit available.

tags | exploit, denial of service, overflow, tcp
MD5 | e7cd861e30878a7551f4a0936bcc69a0
mdaemon.2.8.5.0.txt
Posted Nov 24, 1999
Authored by Underground Security Systems Research

Multiple remote DoS vulnerabilities have been found in the MDaemon 2.8.5.0 server. Binary / Source for this MDaemon Server v2.8.5.0 Denial of Service here.

tags | exploit, remote, denial of service, vulnerability
MD5 | 6e5f9fa57f03d986e57c7fa7ec0f307d
vftpd.txt
Posted Nov 22, 1999
Authored by Underground Security Systems Research

The Vermillion ftp daemon (VFTPD) version 1.23 has a remote DOS attack. Example included.

tags | exploit, remote
MD5 | 691f3143b178a8ef00f3f09fd47c60bb
Page 1 of 2
Back12Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    10 Files
  • 23
    Apr 23rd
    12 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close