kalibb

4 exploits Active since Feb 2020
CVE-2026-28372 NOMISEC HIGH WORKING POC
GNU inetutils <=2.7 - Privilege Escalation
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
CVSS 7.4
CVE-2025-68921 NOMISEC HIGH WORKING POC
SteelSeries Nahimic 3 <1.10.7 - Path Traversal
SteelSeries Nahimic 3 1.10.7 allows Directory traversal.
CVSS 7.8
CVE-2024-31317 NOMISEC HIGH WORKING POC
Google Android - Insecure Deserialization
In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
CVSS 7.8
CVE-2020-0022 NOMISEC HIGH WORKING POC
Android -8.0,8.1,9,10 - RCE
In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715
CVSS 8.8