header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NUUO NVRMini2 3.8 – ‘cgi_system’ Buffer Overflow (Enable Telnet)

A stack buffer overflow exists in the cgi_system binary. The error occurs due to lack of bounds checking on the PHPSESSID value before and when it is passed to sprintf in order to generate the session id file name. As written, this exploit enables Telnet. Executes a command via the stack buffer overflow in cookie parsing. The command is executed via 'system' as root.

CA Release Automation NiMi 6.5 – Remote Command Execution

CA Release Automation (NiMi) Remote Command Execution via Deserialization. Payloads generated using CommonsCollections1 from ysoserial work correctly. Proof of Concept exploits NiMi service if security is turned off.

Remote exploit for Halflife-Servers

This exploit allows an attacker to bind a shell to port 30464/tcp and connect to it. It takes advantage of a buffer overflow vulnerability in Halflife-Servers, specifically in the function that copies shellcode into the buffer. The exploit works by jumping to a specific location in the server code where the instruction 'call *%eax' is located, which executes the shellcode. The buffer overflow is caused by the server not properly filtering out certain characters when copying the shellcode into the buffer.

Missing Address Check in show_opcodes() Callers

The show_opcodes() function in the Linux kernel does not properly validate userspace addresses before printing instruction bytes, which allows local users to read arbitrary kernel memory and obtain sensitive information by triggering a fault on a kernel address and then reading the dmesg logs.

STOPzilla AntiMalware 6.5.2.59 – Privilege Escalation

This exploit allows an attacker to escalate privileges in STOPzilla AntiMalware version 6.5.2.59. By exploiting a vulnerability in the driver version 3.0.23.0 (szkg64.sys), an attacker can create a token with elevated privileges and gain unauthorized access to the system.

Recent Exploits: