header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Light httpd Remote Buffer Overflow

Light httpd is prone to a remotely exploitable buffer overflow condition. This overflow can be triggered by sending the server an excessively long GET request. As Light httpd drops user privileges when running, exploitation of this issue may result in the execution of arbitrary attacker-supplied commands with the privileges of the 'nobody' user.

Visual Tools DVR multiple vulnerabilities

The Visual Tools DVR systems have multiple vulnerabilities that allow an unauthorized user to access the DVR web interface and gain a root shell on the system. The vulnerabilities include administration password disclosure, default administration password, and log files disclosure. The vulnerabilities can be exploited during the first ten minutes after system boot.

Huawei Technologies – Internet Mobile 0day Unicode SEH Based Vulnerability

This exploit targets a vulnerability in Huawei Technologies' Internet Mobile software. It is a Unicode SEH based vulnerability that allows for local exploitation. The exploit has been tested on Windows XP SP1 and may not work on other versions of Windows due to SafeSEH enabled.

Abuse Console Buffer Overflow Vulnerability

By passing an excessively long commandline argument to Abuse, it is possible to overrun a buffer. Exploiting this issue could allow a local attacker to overwrite sensitive memory variables, resulting in the execution of arbitrary code, within the context of the Abuse process.

SolarWinds TFTP Server Arbitrary File Retrieval Vulnerability

The SolarWinds TFTP Server does not properly handle user-supplied input. Due to insufficient handling of user input, it is possible for a remote user to request arbitrary files from the vulnerable server. It would be possible for a remote user to download any files readable through the permissions of the TFTP Server user.

PowerFTP Server Long User Name Handling Remote Overflow

PowerFTP server does not properly handle long user names. When excessive data is supplied as an argument to the FTP 'USER' command, the server becomes unstable. Exploitation of this vulnerability typically results in a crash of the server, requiring a manual restart to resume FTP service.

Recent Exploits: