header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

[PoC2] NVR SP2 2.0 nvUnifiedControl.AUnifiedControl.1 (nvUnifiedControl.dll v. 1.1.45.0) “SetText()” Remote BoF (Heap Spray Technique)

This exploit targets the nvUnifiedControl.AUnifiedControl.1 control in NVR SP2 2.0, specifically the SetText() function. By exploiting a heap spray technique, an attacker can trigger a remote buffer overflow vulnerability in the nvUnifiedControl.dll version 1.1.45.0. This vulnerability allows the attacker to execute arbitrary code on the target system.

VX Search Enterprise v10.2.14 Buffer Overflow (SEH)

This exploit takes advantage of a buffer overflow vulnerability in VX Search Enterprise v10.2.14. The vulnerability allows an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code. The exploit requires enabling the web server and having login credentials for the VX Search webpage.

courier-imap <= 3.0.2-r1 Remote Format String Vulnerability exploit

This exploit targets the courier-imap version 3.0.2-r1 and leverages a remote format string vulnerability to execute arbitrary code. The exploit is launched against the IP address 127.0.0.1 on port 143. The exploit retrieves the current ebp value, possible saved ebp values, and possible write on the stack pointer. It then verifies the obtained values and proceeds to build the necessary components for the exploit, including the format string and shellcode. The exploit uses a ret value of 0x8057000 and the got address of fprintf() at 0x804fefc. After successfully executing the exploit, it gains root access and prints the UID, GID, and group information.

Recent Exploits: