This exploit allows for full ASLR, DEP, and EMET 5.1 bypass in Internet Explorer 8.
This exploit targets Mercur v5.00.14 on the Windows platform. It allows an attacker to execute arbitrary code on the target system by sending a specially crafted payload via an NTLM authentication request. The payload is sent in two parts, with the first part being a base64-encoded string and the second part containing various string and byte values. Upon successful exploitation, the attacker gains control over the target system.
After sending a crafted INVITE message, the Cisco 7940 phone reboots immediately. The vulnerability is caused by the phone not properly checking the sipURI field of the Remote-Party-ID in the message.
This code demonstrates a proof of concept for a resource usage exploit in PHP gd. It uses a linux x86 bindshell on port 4444 from Metasploit. The code also includes offsets for the overwrite and a function for error handling.
The htmltonuke.php file in htmltonuke 2.0alpha for postnuke and PHP-Nuke allows remote attackers to include and execute arbitrary files via a URL in the filnavn parameter.
This module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as 'Sandworm'. Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function.
This module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as 'Sandworm', on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function.
This is an exploit for the vulnerability cve-2014-6332. The exploit was created by yuange in 2009 and is designed to work on systems running Windows 95 with Internet Explorer 3 through Windows 10 with Internet Explorer 11.
This script exploits a Local File Inclusion vulnerability in GeBlog version 0.1. The vulnerability is present in the code where it includes a file based on the value of the 'tplname' parameter. By manipulating this parameter, an attacker can include arbitrary files from the server.
This exploit allows remote code execution through OLE objects. It has been tested on Windows 7 with Office 2007 and 2010.