header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nostromo Directory Traversal Remote Command Execution

This module exploits a remote command execution vulnerability in Nostromo <= 1.9.6. This issue is caused by a directory traversal in the function `http_verify` in nostromo nhttpd allowing an attacker to achieve remote code execution via a crafted HTTP request.

OpenVPN Private Tunnel 2.8.4 – ‘ovpnagent’ Unquoted Service Path

Unquoted service paths in OpenVPN Private Tunnel v2.8.4 have an unquoted service path. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

WMV to AVI MPEG DVD WMV Convertor 4.6.1217 – Buffer OverFlow (SEH)

The WMV to AVI MPEG DVD WMV Convertor version 4.6.1217 is vulnerable to a buffer overflow vulnerability, which can be exploited to execute arbitrary code. By pasting specially crafted content from EVIL.txt into the 'License Name and License Code' field and clicking 'OK', an attacker can trigger the buffer overflow and gain a bind shell on port 4444.

Microsoft Windows Server 2012 – ‘Group Policy’ Security Feature Bypass

This exploit code targets vulnerable systems in order to corrupt GPO updates which causes the target system to revert various security settings to their default settings. This includes SMB server and network client settings, which by default do not require SMB signing except for domain controllers. Successful exploitation against a system with a hardened configuration that requires SMB Signing by the network client will make the target system vulnerable to MS15-011, which can lead to remote code execution.

Win10 MailCarrier 2.51 – ‘POP3 User’ Remote Buffer Overflow

This exploit allows an attacker to remotely trigger a buffer overflow in the 'POP3 User' field of Win10 MailCarrier version 2.51. By exploiting this vulnerability, an attacker can gain unauthorized access and control over the affected system. The exploit code is written in Python and includes a payload generated using msfvenom. It should be noted that different versions of Windows 10 may have different offsets, and sometimes the exploit needs to be run twice to successfully pop a shell.

Recent Exploits: