A stack buffer overflow occurs when copying a user supplied input to a stack buffer of user supplied size.
This vulnerability allows an attacker to remotely include a file on the target system. It was discovered by DeltahackingTEAM and exploited by Dr.Pantagon.
Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability Prove Of Concept Exploit
This exploit targets the DivX Player 6.4.1 plugin installed with DivX Player. By executing a specific script, it causes a denial of service attack in Internet Explorer.
Multiple overflow conditions occur within mbse-bbs versions 0.70.0 & below. The current version of mbse-bbs does not contain these weaknesses. Exploitation of these vulnerabilities can facilitate a privilege escalation attack in which an unprivileged user becomes root. Exploit calculates return address where ASLR is not in use. Vulnerable code is shown below;matthew@localhost ~/foo/mbsebbs-0.70.0/unix $ cat -n mbuseradd.c...177 shell = calloc(PATH_MAX, sizeof(char));...228 sprintf(shell, "%s/bin/mbsebbs", getenv("MBSE_ROOT"));(heap corruption in 0.33.17/stack overflow in others). *** glibc detected *** free(): invalid next size (normal): 0x0804e068 ***Example Usage.matthew@localhost ~ $ iduid=1000(matthew) gid=100(users) groups=10(wheel),100(users)matthew@localhost ~ $ ./prdelka-vs-GNU-mbsebbs /opt/mbse/bin/mbuseradd[ GNU/Linux mbse-bbs 0.70.0 & below stack overflow exploit[ Using return address 0xbfffefd8sh-3.1# iduid=0(root) gid=1(bin) groups=10(wheel),100(users)- prdelka
The vulnerability allows remote attackers to include arbitrary files via a crafted HTTP request.
This exploit creates a file named "Hello.txt" in the C: drive with the content "Hello from ring-0! :)". It targets a vulnerability in kav 6.0.
Sending command SITE ADMN + 32 makes server BOOM
The Jshop Server 1.3 is vulnerable to remote code execution. An attacker can exploit the vulnerability by injecting malicious code through the 'jssShopFileSystem' parameter in the 'fieldValidation.php' file. This allows the attacker to execute arbitrary code on the target system.
Calling certain function names in the service causes the service to throw an access violation while dereferencing the return value from a call to FindIndex.