header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TP-Link VN020 F3v(T) TT_V6.2.1021 – DHCP Stack Buffer Overflow

The exploit triggers multiple memory corruption vectors in DHCP parsing of TP-Link VN020 F3v(T) TT_V6.2.1021 routers. It involves a stack overflow through an oversized hostname (127 bytes), parser confusion via malformed length fields, and a vendor-specific option parsing edge case. By sending a crafted DHCP DISCOVER packet, the attacker overflows the hostname buffer and corrupts length fields in DHCP options, leading to a service crash.

Centron 19.04 – Remote Code Execution (RCE)

The exploit allows for remote code execution in Centreon 19.04 through a login password bruteforce attack using the centbruteon.py script. By sending specially crafted requests to the Centreon API authentication endpoint, an attacker can execute arbitrary code on the target system.

Microsoft Windows 11 Pro 23H2 – Ancillary Function Driver for WinSock Privilege Escalation

The Ancillary Function Driver for WinSock in Microsoft Windows 11 Pro 23H2 allows local users to gain privileges via a crafted application, leading to privilege escalation. This vulnerability is identified as CVE-2024-38193.

Apache Tomcat Path Equivalence – Remote Code Execution

The exploit allows remote attackers to execute arbitrary code on the target system by uploading a malicious payload to a specific URL and triggering it through a crafted request. This vulnerability is identified as CVE-2025-24813 affecting Apache Tomcat versions prior to 11.0.3, 10.1.35, and 9.0.98.

ProConf 6.0 Insecure Direct Object Reference Vulnerability

In ProConf version before 6.1, an Insecure Direct Object Reference (IDOR) vulnerability exists. This vulnerability allows any author to access and retrieve all submitted papers including titles, abstracts, and personal information of authors (such as Name, Email, Organization, and Position) by manipulating the Paper ID parameter.

Recent Exploits: