Real Name | noname |
---|---|
Email address | private |
First Active | 2009-02-04 |
Last Active | 2021-01-16 |
This report explains the ability to change the code of Bart. An attacker can edit the code and seamlessly put their own dark website with a different Bitcoin account.
235979bd4239144dac76322065de02f0e43ecad6b1af8f34cf9b75dd3c4fb090
Acoem 01dB CUBE Smart Noise Monitoring Terminal suffers from a remote password change vulnerability.
4dd7294ed2880c398067b21bcfb2c8cc07b8f38d4984f6fa4a6df92f82c918a6
Acoem 01dB DUO Smart Noise Monitor suffers from a remote password change vulnerability.
9239f9b9ccb65830020e710a86a10e00e8fdd77ce254a91a8deb32e4fea8cfc5
Microsoft Windows Server AD LDAP RootDSE Netlogon (CLDAP "AD Ping") query reflection denial of service proof of concept exploit.
fd13733c886474c28d4cb1051b620bdfe6ff808ee27e89d220108f9ddab1fdee
ASUS DSL-X11 ADSL router unauthenticated remote DNS changer exploit.
93f34477ca80d1b371bd59eec1b073b39526d51e18f1d4b32ba199d040c8d367
COMTREND ADSL router CT-5624 C01_R03 unauthenticated remote DNS changer exploit.
3f980e48cba96dc8f106f0e6c0a75038a0ee785b217fe44545a3d7abc69d1231
COMTREND ADSL router CT-5367 C01_R12 unauthenticated remote DNS changer exploit.
e480d4507c963ac594953ced80b3a31a9b8aab94fa5113694da85cd569cd31be
Tenda ADSL2/2+ modem version 963281TAN unauthenticated remote DNS changer exploit.
7a8d3c4dbd3667e98cf6bb464cb26347ffbb09d2667a28fd71f9f5506df04ea4
PLANET VDR-300NU ADSL Router unauthenticated remote DNS changer exploit.
8197ee2306f964cdd22efee0d369aace2490e04ef7b237eaf2035d705b1e7e58
PIKATEL 96338L-2M-8M unauthenticated remote DNS changer exploit.
f31def2cd14ba72db4bf55b1aef4e8bc057ad948d670593d351e85195d3dd034
PIKATEL 96338WS unauthenticated remote DNS changer exploit.
596be1de21272fb1b77bedf46d16b77640ce788f243002e315626dc0d7df7e35
Exper EWM-01 ADSL/MODEM unauthenticated remote DNS changer exploit.
93fde35b7c746959d79e57ca13e221260f073b947a6e4133230979af7ceec22f
Inteno EG101R1 VoIP Router unauthenticated remote DNS changer exploit.
873d98f5b0dd13d80e9d6c6b19685ca72ef286d52b868b4d74c7f516f63ee1e3
INTELLINET IP Camera INT-L100M20N remote change admin username / password exploit.
4eaae419672cabc06fd7de62a5c5e616f92153a1c485b352db79b6f0ae052629
This exploit demonstrates an authentication bypass on multiple MESSOA IP cameras that can change the admin username and password.
68666b30d1b6dddf00299fd74cd0dc2022915959fe608e0c0d8ec6d47b0aad91
IpNetCam A107WIRF-HNH-03 IP-Camera release 0.376.223 suffers from an authentication bypass vulnerability that allows for configuration download.
569faf01e457880f5ce0f17f33d1abec6b4ddf53121a98601078eb108549c8f7
The MESSOA NIC990 IP-Camera suffers from an authentication bypass vulnerability that allows for configuration download.
6175efe337e7dab435edcf61a9bcdaac2005dc4276481888317753c46b51c2bc
The TOSHIBA IK-WP41A IP-Camera suffers from an authentication bypass vulnerability that allows for configuration download.
fd80acc5f1b082bdf356d302c9d57f936f99040d777be1a941c3a23cc9f09764
Multiple SIEMENS IP Cameras suffers from an authentication bypass vulnerability that allow for configuration download.
9ecd39104a21b7de939796b1096f82dd87b0d0b7e80942994a8a96a80ca2053c
SIEMENS IP Camera CCMW1025 version x.2.2.1798 remote change admin user / password exploit.
e574218048ed693e31f4c6c1c0307b79dfa61879f56aa22331545be561d97c39
Belkin N300 Wifi N Router F9K1010 suffers from an arbitrary file disclosure vulnerability.
d1d30cc1ca221150e284d860d9f3434d2258b60abbb1663bb53203a4c180f2a1
ZTE ZXHN H108N suffers from an unauthenticated configuration download vulnerability.
9492b3a69ae4e315aa3846b3d5e95780dc24f6ca97111b000a275c42a4a7dbe0
ZTE ZXHN H108N version 3.3.0_MU suffers from a CWMP configuration disclosure vulnerability.
2a0797ba5acfc3ee0289de8d4ef17774c784e1c02fafa0180d9adb61c382dae0
Counter-Strike version 1.6 GameInfo query reflection denial of service proof of concept exploit.
d88c5d35e07f94e50c9cdb08db697a01e63c1bfaa68fe25c3c562c74dc0ed946
NetBIOS NBSTAT name query reflection denial of service proof of concept exploit.
64eedc77e04daae82e3317cca2ba26267d63f8097003b3f9fcc142d9311aa277