Sugar Suite Open Source <= 4.0 beta is vulnerable to remote code execution. The vulnerability is due to insufficient input validation in the application. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.
This proof of concept will only prevent someone from reopening their browser after being exploited. DoS if you will. however, code execution is possible with some modifcations.
This exploit allows an attacker to execute arbitrary code on a vulnerable Sugar Suite Open Source version 4.0beta. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable server. The attacker can then execute arbitrary code on the vulnerable server.
A buffer overflow vulnerability exists in Widcomm Bluetooth Software due to improper bounds checking of user-supplied data. An attacker can exploit this vulnerability by sending a specially crafted packet to the target system, resulting in arbitrary code execution.
This exploit allows an attacker to upload a shell to the vulnerable DoceboLMS AKA SpaghettiLearning <= 2.0.4 web application. The attacker can then execute arbitrary code on the vulnerable system.
This exploit is a remote code execution vulnerability in the Bluetooth sobexsrv service. It allows an attacker to execute arbitrary code on the target system by sending a specially crafted packet to the service. The exploit uses the exit() function to overwrite the return address of the stack frame with the address of the shellcode. The shellcode is then executed.
WinEggDropShell is vulnerable to a stack overflow vulnerability when sending a specially crafted USER or GET command. This can be exploited to cause a denial of service condition by crashing the application.
This exploit is for a buffer overflow vulnerability in the phgrafx application on QNX 6.3.0 x86. The exploit uses a shellcode to call the system() function and execute arbitrary code. The exploit is written in C and uses the dlopen() and dlsym() functions to get the address of the system() function. The exploit also checks for bytes like 0x00, 0x09 or 0x0a in the address of the system() function, as the application seems to truncate those bytes. The exploit then uses a loop to fill the buffer with 'A' characters, followed by the address of the system() function and the shellcode. Finally, the exploit calls the execl() function to execute the phgrafx application with the buffer as an argument.
This code when viewed in Internet Explorer raises the CPU utilization to 100%. The code was tested on Windows 2000 server SP4. The issue does not occur with the hotfix for GDI (MS05-053) installed.
This exploit allows an attacker to inject arbitrary PHP code into a vulnerable Guppy <=4.5.9 web application. The exploit is launched from an Apache server and requires the attacker to fill in the requested fields. Once the exploit is launched, the attacker can execute remote commands.