This is a proof of concept exploit for a remote code execution vulnerability in atftpd. It targets a specific version of Linux (Debian 3.0) and uses a shellcode to execute commands on the target system. The exploit takes advantage of a heap overflow vulnerability in the atftpd software.
The exploit causes a SIGSEGV crash in an ASAN build of Wireshark by feeding a malformed file to tshark.
A static out-of-bounds read vulnerability exists in Wireshark, specifically in the dissct_rsl_ipaccess_msg function in packet-rsl.c. By feeding a malformed file to tshark, an attacker can trigger a global buffer overflow, leading to a crash. The vulnerability can be observed in an ASAN build of Wireshark (current git master).
The crash occurs in Wireshark's packet-zbee-zcl-general.c file during the dissection of a malformed file with tshark. It triggers a global buffer overflow error, leading to a read of 4 bytes at an out-of-bounds address.
The crash occurs due to an assertion failure in Wireshark when feeding a malformed file to tshark. The specific error is in wmem_core.c, line 50, where the allocator is expected to be in scope but is not.
The exploit overwrites the system.ini file, potentially causing the PC to not restart. It affects Morovia Barcode ActiveX Professional 3.3 (build 1304) on Windows XP Professional SP2 with Internet Explorer 7.
This proof of concept demonstrates a stack overflow vulnerability in the hpqvwocx.dll version 1.0.0.309. The vulnerability allows an attacker to execute arbitrary code by clicking a button that triggers the OuCh() function.
This module exploits a remote command execution on the Legend Perl IRC Bot. This bot has been used as a payload in the Shellshock spam last October 2014. This particular bot has functionalities like NMAP scanning, TCP, HTTP, SQL, and UDP flooding, the ability to remove system logs, and ability to gain root, and VNC scanning. Kevin Stevens, a Senior Threat Researcher at Damballa has uploaded this script to VirusTotal with a md5 of 11a9f1589472efa719827079c3d13f76.
eTrust Antivirus r8 is prone to a stack-based buffer overflow vulnerability. The vulnerable code is located at IN0CORE.DLL in the function QSIGetQueueID which internally calls QSIGetQuePath passing a fixed buffer in order to retrieve the queue path, no validation is done for the buffer size. Malicious users can modify the buffer through the file mapping with a long file path, triggering the stack-based buffer overflow.
Update 2015 The Siemens Simatic S7-1200 S7 CPU start and stop functions over ISO-TSAP.