Real Name | noname |
---|---|
Email address | private |
First Active | 2009-02-04 |
Last Active | 2021-01-16 |
UPNPD M-Search ssdp:discover reflection denial of service exploit.
f367c58f0ffd545e2d90772fec10aeb953a0bcdc97164f66bdb1c8a16e3d98a9
A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible NTP servers to overwhelm a victim system with UDP traffic. The NTP service supports a monitoring service that allows administrators to query the server for traffic counts of connected clients. This information is provided via the "monlist" command. The basic attack technique consists of an attacker sending a "get monlist" request to a vulnerable NTP server, with the source address spoofed to be the victim's address. This tool is a proof of concept that demonstrates this attack.
48b0f0fb221c6a092ee7210ff8b830e0b5ba18fd3294e65cf266ee2f4b6a19f1
MiniUPNPd version 1.0 remote denial of service exploit.
ec5af0b0817b8cabdfaec4fbe7d5121d205649e7588521b0ad1d8d6592bbe575
D-Link DSL-2780B DLink_1.01.14 suffers from an unauthenticated remote DNS change vulnerability.
cecf684605be67457577f0c485b7ac88cdd5fa0ae4781581dc2b770628494529
TP-Link ADSL2+ TD-W8950ND suffers from an unauthenticated remote DNS change vulnerability.
e734de776dd42a9b07102f99c9c5e872918d43423edddcfb093dbbd2cff10baa
D-Link DSL-2730B AU_2.01 suffers from an authentication bypass vulnerability that allows an attacker to change DNS settings.
ba801c06a255c78e4fe5a0151bb18eec1e82a99b3855dbad759c4bb4ad87530b
D-Link DSL-526B ADSL2+ AU_2.01 suffers from an unauthenticated remote DNS change vulnerability.
a045df7dae3d97ce54f437138ae3bfaa1ac885796c92d3c02efe05eadd9a69a5
Broadlight Residential Gateway DI3124 suffers from an unauthenticated remote DNS change vulnerability.
cfe753189efca508794672853afd1471566254d5d91a94c2466e0d28e39af396
Remote exploit for changing DNS settings unauthenticated on the D-Link DSL-2640B.
16ab1d79cb7cf86f00b8d3d3e809b23c74f2de54632f5804f5f0d5dc9ed96331
LG DVR LE6016D unauthenticated remote user/password disclosure exploit.
78215c344bc67ecd36fd93e2a2a8dabff0e7aeadc8ca7856997f62aae484d853
Shuttle Tech ADSL Modem-Router 915 WM unauthenticated remote DNS change exploit.
867fc1e4a1a8ece9743f8a03a17fbde7500f5eef41e8a82aa4fe7af775f0df16
Exploit for remotely changing DNS settings on the D-Link DSL-2740R router.
12bcee98da8a2545e67c0fd61295e3e76c43d64f193a59bac3a91c594c824b90
Remote root exploit for all Seowonintech devices.
595a7decdc3f52417856da361543526dde0357dd9c1d41fd0828e62432f3bfa8
This exploit dumps an arbitrary file from the filesystem with root level permissions on Seowonintech routers with firmware less than and equal to 2.3.9.
a361e183bb4d71aeac2a13c018d683c22813b4cf4ffebf480914b8997082860a
Local root exploit for Glibc versions 2.11.3 and 2.12.x utilizing LD_AUDIT libmemusage.so.
dbe0977154f9ed4331b96211af365a5ddd2b1de1c5253179073a44cea5e541e3
Konftel 300IP SIP-based conference phone versions 2.1.2 and below remote bypass reboot exploit.
9e507e381e6d3283aca016657d917380e4a9531c10b62c0736789e6838811a3f
StarVedia IPCamera IC502w and IC502w+ version 020313 remote bypass username/password disclosure exploit.
b2e1e754ab46c85bc8c173378b2b272899f11b8f2b489f6d503525cd01b556aa
Mozilla Firefox versions 10.0 and below local null byte bypass file check execution exploit.
a174b8edc7151cb08988e3beb64669d96fed35392c36ee8265516b5437c6cfee
Microsoft Internet Explorer 8 suffers from a denial of service vulnerability due to a stack exhaustion issue.
c0206d977f507f789c26838b5b33a945a10259c50ae11b7756dce67dd5c7f7ae
Enigma2 Webinterface versions 1.5.x, 1.6.x and 1.7.x suffers from a remote file disclosure vulnerability.
fc9bbc6820fa00c3414e7ddd9289efbd8460427518afafafd0bb63131d292e51
Comtrend Router CT-5624 remote root / support password disclosure and change exploit.
f88bd04a8b099f31b8c798590cd329225fab81697add7757cef9329447167836
DreamBox DM800 versions 1.5rc1 and below remote file disclosure exploit.
8fee3da667376ed45ce7f37d430981833a80f00a5a6fc6e5635f8b8511dad4df
Linux kernel version 2.6.37-rc1 and below serial_multiport_struct local leak exploit.
339995fa1d5103f1059305032d85f8e55df5432a09a475ad860ec38a5fb31050
ACTi ASOC 2200 Web Configurator versions 2.6 and below remote root command execution exploit. This is a secondary version of the original and is written in Python.
41a108b19f2cd58cd1b3bf78f695f0fc0293c132dc307dfb6fe1b4b8907d2d97
ACTi ASOC 2200 Web Configurator versions 2.6 and below remote root command execution exploit.
1fe62001e15658ce95ca3b7e3476da02cdd828855e2386ef2c8cbbf0f8645164