what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 50 RSS Feed

Files

DSR-nethack.c
Posted Feb 20, 2003
Authored by Bob | Site dtors.net

Nethack v3.4.0 local buffer overflow exploit which spawns a shell as uid=games. Runs /usr/games/lib/nethackdir/nethack.

tags | exploit, overflow, shell, local
SHA-256 | d36c9676766104ed6f0e30024d355ec827f58589e60d86e963361827c6ef5db0

Related Files

Active Directory Attacks - Red It Out
Posted Nov 9, 2020
Authored by Akash Sarode

This paper is focused on the Active directory attacks and various techniques which can be used by an attacker to abuse an AD environment in an enterprise network. This would also mark an introduction to Active directory along with its components. Topics covered include an introduction to Active Directory, Active Directory Structure, Multiple Attack Phases, Domain Persistence Techniques, Golden Ticket Attack, DCSync Attack, Silver Ticket Attack, and DSRM Attack techniques.

tags | paper
SHA-256 | 44a6dc0147aec02f155b590f92ed64b64954750c17a82f9750df4a42169a6b70
D-Link DSR-250N Denial Of Service
Posted Oct 8, 2020
Site redteam-pentesting.de

RedTeam Pentesting discovered a denial of service vulnerability in the D-Link DSR-250N device which allows unauthenticated attackers in the same local network to execute a CGI script that reboots the device. Version 3.12 is confirmed affected.

tags | exploit, denial of service, local, cgi
advisories | CVE-2020-26567
SHA-256 | 9c93e843468650bf0270222facd25a1ee3a9a2887cda11b88288285ab0184247
D-Link DSR Router Remote Root Shell Overview
Posted Dec 7, 2013
Authored by 0_o

This is a brief overview of the unauthenticated non-persistent remote root shell vulnerability in various D-Link DSR routers. Versions affected include D-Link DSR-150 (Firmware < v1.08B44), D-Link DSR-150N (Firmware < v1.05B64), D-Link DSR-250 and DSR-250N (Firmware < v1.08B44), D-Link DSR-500 and DSR-500N (Firmware < v1.08B77), D-Link DSR-1000 and DSR-1000N (Firmware < v1.08B77).

tags | advisory, remote, shell, root
advisories | CVE-2013-5945, CVE-2013-5946
SHA-256 | de55e4448a4bec277f8621aefbf5e5ac01929a5f13a3f4b74cc2b5712046d40e
D-Link DSR Router Remote Root Shell
Posted Dec 7, 2013
Authored by 0_o

D-Link DSR router series remote root shell exploit. Versions affected include D-Link DSR-150 (Firmware < v1.08B44), D-Link DSR-150N (Firmware < v1.05B64), D-Link DSR-250 and DSR-250N (Firmware < v1.08B44), D-Link DSR-500 and DSR-500N (Firmware < v1.08B77), D-Link DSR-1000 and DSR-1000N (Firmware < v1.08B77).

tags | exploit, remote, shell, root
advisories | CVE-2013-5945, CVE-2013-5946
SHA-256 | 0ddcd599410d5c9d4349753fb1f66fbb2cd3e9606f56a18a28615b7d3f5dd814
D-Link DSR-250N Backdoor
Posted Nov 25, 2012
Authored by 0_o

D-Link DSR-250N has a backdoor account that allows for persistent root access.

tags | exploit, root
SHA-256 | 80fd9d3e7fad566709a302521d1f123f923a95c1459f2c137d1705ee73d4dd6c
Autonomy Keyview Ichitaro Object Reconstruction Logic
Posted Oct 7, 2011
Site secunia.com

Secunia Research has discovered a vulnerability in Autonomy Keyview, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by a logic error in the Ichitaro speed reader (jtdsr.dll) when attempting to reconstruct higher-level objects and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Version 10.3 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2011-0339
SHA-256 | d5e75933e09e845ef137f1e214acd3daba62b091b867d3f86c99c49c4fb8a1bd
Autonomy Keyview Ichitaro Text Parsing Buffer Overflow
Posted Oct 7, 2011
Site secunia.com

Secunia Research has discovered a vulnerability in Autonomy Keyview, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by a boundary error in the Ichitaro speed reader (jtdsr.dll) when parsing "Text" chunks and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Version 10.3 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2011-0338
SHA-256 | d4c58b78a917a3975cccd3fd186aa9b3e2b0fa0d8eb7ac3c3fa3f6db6467cd41
Autonomy Keyview Ichitaro QLST Integer Overflow
Posted Oct 7, 2011
Site secunia.com

Secunia Research has discovered a vulnerability in Autonomy Keyview, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by an integer overflow error in the Ichitaro speed reader (jtdsr.dll) when parsing QLST chunks and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Version 10.3 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2011-0337
SHA-256 | d24cd05a6e4d709be1e57e4e15c52c15b5a2ed2e2c1e3e61fc50b6f372182659
Everfocus EDSR 1.4 Cam Exploit
Posted Oct 15, 2009
Authored by Andrea Fabrizi | Site andreafabrizi.it

The Everfocus EDSR firmware fails to correctly handle authentication and sessions. This remote exploit takes advantages of versions 1.4 and below and lets you view the live cameras of remote DVRs.

tags | exploit, remote
SHA-256 | 10026da1a7949dc0eaf28f986ef241f8679e65ad5c74df580ec8f86a61a39823
msbasic-overflow.txt
Posted Apr 4, 2008
Authored by shinnai | Site shinnai.altervista.org

Microsoft Visual Basic Enterprise Edition version 6 SP 6 DSR file local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | ed4d787e9973a5566ae6707044eda9ca12236913f12acae8689d9011cebc6c40
msvis-dsr.txt
Posted Jan 19, 2008
Authored by shinnai | Site shinnai.altervista.org

Microsoft Visual Basic Enterprise Edition version 6 SP6 .dsr file handling buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 106ce6bde9a3606161a71ede5227c28c721428fe4cb6f33aea861c28e5842d16
matousec-2006-07-15.02.txt
Posted Jul 19, 2006
Site matousec.com

Norton insufficiently checks calling standard Windows API functions RegSaveKey, RegRestoreKey and RegDeleteKey. A proper combination of mentioned function calls on registry key 'HKLM\SYSTEM\CurrentControlSet\Services\SNDSrvc' or on key 'HKLM\SYSTEM\CurrentControlSet\Services\SymEvent' causes a system crash due to erroneous implementation of Norton's driver. Norton Personal Firewall 2006 version 9.1.0.33 is affected. Other versions of Norton software may also be affected.

tags | advisory, registry
systems | windows
SHA-256 | 8691d1f66cce2d51c2c679dfa90755af6fd62ceaf01f42c021b8a8f45c7e0dd7
DSR-QNX6.2.1-phfont.sh.txt
Posted Feb 10, 2006
Authored by Knud Erik Hojgaard | Site lort.dk

Local root exploit for QNX Neutrino RTOS's phfont command. Affects QNX Neutrino RTOS version 6.2.1. Earlier versions may also be susceptible.

tags | exploit, local, root
SHA-256 | 9bbca002dda89b554504a0ee6a50ba18b07eb0cad32ac21956c276f13c26e03b
DSR-cisco-pikkemand.sh
Posted Feb 2, 2006
Authored by dsr, Knud Erik Hojgaard

Cisco AP remote denial of service exploit that makes use of maliciously crafted ARP requests.

tags | exploit, remote, denial of service
systems | cisco
SHA-256 | 4083da861a5b98c1c4884acb301763e04d58d02fe2ac8140746df0c0400371a0
DSR-farmerswife44sp1.pl.txt
Posted Jan 15, 2006
Authored by Knud Erik Hojgaard

Farmers WIFE version 4.4 sp1 ftpd remote exploit that allows for system compromise.

tags | exploit, remote
SHA-256 | 890997b51723f28c17e0b21e78bc7cc7e3e5fb4620c3ebe70555565e6bffafc1
fr-dyn0.txt
Posted Oct 4, 2005
Authored by codeslag | Site 0xdeadface.co.uk

www.friendsreunited.co.uk suffers from a XSS vulnerability in the lost password section.

tags | exploit
SHA-256 | a85ff1a125b3942fe05765e508b818857b721d857c377c7a3625b6898197d84a
callds.c
Posted May 1, 2004

MS04-011 DsRoleUpgradeDownlevelServer remote exploit. Submitted anonymously.

tags | exploit, remote
SHA-256 | c345e1ceaf031691148d79a9fafffd9b68fdbe6f2ffeb4b7ad70da3edd68b5fe
04252004.ms04011lsass.c
Posted May 1, 2004
Authored by sbaa

Remote exploit for the Lsasrv.dll RPC buffer overflow. To make this exploit work remotely you have to use the sbaaNetapi.dll which modifies the DsRoleUpgradeDownlevelServer API.

tags | exploit, remote, overflow
SHA-256 | c155fee77b812701dd4efb98b8ad352943a5fa4ca64edab679c6ddefca7a2e45
DSR-wmapm.sh
Posted Nov 8, 2003
Authored by Knud Erik Hojgaard | Site kokanins.homepage.dk

Wmapm v3.1 local exploit - Gives a shell with UID=operator in FreeBSD if compiled via ports collection, or UID=root if compiled from source on FreeBSD or Linux. Requires a valid X display.

tags | exploit, shell, local, root
systems | linux, freebsd
SHA-256 | 310dae0751d751688fbae10e7aa187a1b9842453da5cc6e64fb855d8d69cffe6
DSR-cfengine.pl
Posted Sep 26, 2003
Authored by Knud Erik Hojgaard | Site dtors.net

Remote exploit for Cfengine versions 2.-2.0.3 that makes use of a stack overflow discussed here. Tested against FreeBSD 4.8-RELEASE. Binds a shell to port 45295.

tags | exploit, remote, overflow, shell
systems | freebsd
SHA-256 | e3e547732748f7447108587f2723bccdb4db27e138cffb4956e21946879efff3
DSR-virobot.pl
Posted Aug 26, 2003
Authored by Knud Erik Hojgaard | Site dtors.net

Local exploit for ViRobot 2.0 that works against the FreeBSD edition. Tested against FreeBSD 4.8.

tags | exploit, local
systems | freebsd
SHA-256 | 41059e552df59b7c97ce59335d8a8059d66eb278653f384fb513f884278d70fd
DSR-gnats.pl
Posted Jul 20, 2003
Authored by dsr, inv | Site dtors.net

Proof of concept local exploit for gnats version 3.113.1_6 tested on FreeBSD 5.0. If successful, escalates privileges to gnats.

tags | exploit, local, proof of concept
systems | freebsd
SHA-256 | 2b31b10d89b57698e84d31e47881d7d90cf4391690ee56926c5a87a74db28850
DSR-upclient.pl
Posted Jul 14, 2003
Authored by dsr, inv | Site dtors.net

Local exploit for Upclient 5.0.b5 that spawns a shell with kmem privileges. Tested on FreeBSD 5.0.

tags | exploit, shell, local
systems | freebsd
SHA-256 | 12ad32e03b238b43ac52391150406436f569b35875fd12e93cbdce6c5c310419
DSR-mirc-url-spoofing.txt
Posted Jul 11, 2003
Authored by dsr, Knud Erik Hojgaard | Site dtors.net

mIRC 6.03 and below allows an attacker to misleading supply a URL that poses as one URL but leads to another by setting the color of the secondary URL to the default background color.

SHA-256 | 6b69a01535a0c67322cb56b25faa8fc7dba090f0825a3a04ed026b05cdd0462d
DSR-mirc-dcc-server.txt
Posted Jul 11, 2003
Authored by dsr, Knud Erik Hojgaard | Site dtors.net

mIRC 6.03 and below allow the ability for a remote attacker to spoof a dcc chat request in a targets client.

tags | remote, spoof
SHA-256 | e563523994f9fa8795dd89183f1920def4ff07f15d1392c758656569e82a5204
Page 1 of 2
Back12Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close