# NBMonitor 1.6.8 拒绝服务漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Network Security Auditing Tools | Nsauditor -- 🔗来源链接
标签:product
神龙速读:
从该网页截图中,关于漏洞的关键信息可以总结如下:
- **Nsauditor Network Security Auditor**
- 用于审计网络的安全性,检测漏洞及增强网络保护。
- **Product Key Explorer**
- 能恢复约10,000款流行软件的产品密钥,可能提示存在对未经授权访问软件的潜在风险。
- **Password Recovery Software**
- 可用于从流行浏览器中恢复遗忘的密码,可能对密码安全构成潜在威胁。
- **Hardware Software Inventory**
- 提供计算机硬件和软件的全面报告,用于网络管理优化,可能涉及数据隐私问题。
- **Awards, Testimonials, Customers**
- 展示产品的认可度、客户评价和用户基础,但与直接的漏洞信息无关。
标题: NBMonitor 1.6.8 - Denial of Service (PoC) - Windows dos Exploit -- 🔗来源链接
标签:exploit
神龙速读:
### Vulnerability Information
- **Title:** NBMonitor 1.6.8 - Denial of Service (PoC)
- **EDB-ID:** 49964
- **CVE:** N/A
- **Author:** Erick Galindo
- **Type:** DOS
- **Platform:** Windows
- **Date:** 2021-06-08
- **Vulnerable App:** nbmonitor
- **Exploit Verified:** No
### Details
- **Exploit Title:** NBMonitor 1.6.8 - Denial of Service (PoC)
- **Date:** 07/06/2021
- **Author:** Erick Galindo
- **Vendor Homepage:** http://www.nsauditor.com
- **Software Link:** http://www.nbmonitor.com/downloads/nbmonitor_setup.exe
- **Version:** 1.6.8
- **Tested on:** Windows 10 Pro x64 es
### Proof of Concept
1. Copy printed "AAAAA..." string to clipboard!
2. Go to Register > Enter Registration Code...
3. Write anything in 'Name' field
4. Paste clipboard in 'Key' field
5. Click on button -> Ok
标题: NBMonitor 1.6.8 - Denial of Service | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
### 关键漏洞信息
- **漏洞名称**: NBMonitor 1.6.8 - Denial of Service
- **严重程度**: Medium
- **发布日期**: January 15, 2026
- **影响版本**: NBMonitor 1.6.8
- **CVE编号**: CVE-2021-47814
- **CVE类型**: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- **CVSS评分**: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
- **ExploitDB编号**: ExploitDB-49964
- **厂商主页**: [Vendor Homepage](#)
- **Credit**: Erick Galindo
- **Description**: NBMonitor 1.6.8 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the registration code input field. Attackers can paste a 256-character buffer into the registration key field to trigger an application crash and potential system instability.
暂无评论