header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Savant 3.1 Web Server Overflow

This module exploits a stack buffer overflow in Savant 3.1 Web Server. The service supports a maximum of 10 threads (for a default install). Each exploit attempt generally causes a thread to die whether successful or not. Therefore, in a default configuration, you only have 10 chances. Due to the limited space available for the payload in this exploit module, use of the "ord" payloads is recommended.

OpenBSD 3.4 exec.c Remote Exploit

The OpenBSD 3.4 exec.c file is vulnerable to remote code execution. An attacker can exploit this vulnerability to execute arbitrary code on the target system. The vulnerability is caused by a lack of input validation in the exec.c file. A remote attacker can send a specially crafted request to the target system, which will trigger a buffer overflow and allow the attacker to execute arbitrary code with the privileges of the user running the affected application. This vulnerability has a CVSS score of 9.8 (Critical).

Cisco IOS and MGX Switches TFTP Server File Name Handling Buffer Overflow

A buffer overflow vulnerability exists in the TFTP server file name handling of Cisco IOS and MGX switches. Insufficient bounds checking on requested file names allows an attacker to send a request for a file name of 700 or more bytes, causing a denial of service and potential code execution. On Cisco IOS, the router crashes and reboots, while on Cisco MGX switches, the TFTP service fails but the device continues to function.

Recent Exploits: