The server doesn't do a sanity-check on 'Content-Length' value from POST Header, allowing the attacker to control the allocation size and the position in the 'pucPayload' char pointer to write. This could be used to trigger an exception.
This exploit targets a buffer overflow vulnerability in Disk Savvy Enterprise 9.0.32. It allows an attacker to execute arbitrary code with NT AUTHORITYSYSTEM privileges. The exploit does not require authentication. The IP address, shellcode, and bytes can be adjusted as needed. It has been tested on Windows 7 x86 Enterprise SP1.
The exploit allows an attacker to execute arbitrary code and gain NT AUTHORITYSYSTEM privileges in Disk Sorter Enterprise version 9.0.24. The exploit does not require authentication and can be triggered by sending a specially crafted request. The exploit has been tested on Windows 7 x86 Enterprise SP1.
This exploit targets a buffer overflow vulnerability in Dup Scout Enterprise 9.0.28. It allows an attacker to execute arbitrary code and gain NT AUTHORITYSYSTEM privileges without authentication. The exploit has been tested on Windows 7 x86 Enterprise SP1. The payload size is 308 bytes.
This exploit targets Sync Breeze Enterprise version 8.9.24. It allows an attacker to execute arbitrary code and gain NT AUTHORITYSYSTEM privileges on the target system. The exploit does not require authentication and can be used without a valid password. The payload size is 308 bytes.
This exploit targets Disk Pulse Enterprise 9.0.34 and allows an attacker to achieve NT AUTHORITYSYSTEM privileges without authentication. The exploit requires adjusting the IP address, shellcode, and bytes. It has been tested on Windows 7 x86 Enterprise SP1.
This is an exploit for the Windows Animated Cursor Stack Overflow Vulnerability. The vulnerability allows an attacker to execute arbitrary code by creating a specially crafted animated cursor file. This exploit takes advantage of the vulnerability to execute a reverse shell payload.
Windows Firewall Control lacks quotes in filepath, allowing a potential vector of privilege escalation attack. The local attacker can insert an executable file in the path of the service, which will be run with elevated privileges upon service restart or system reboot.
Netgear Genie installs a service called 'NETGEARGenieDaemon' with an unquoted service path running with SYSTEM privileges. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system.
This exploit is related to the Microsoft GDI+ library, specifically in the handling of .ICO files. It involves an integer division by zero flaw, which can lead to a denial of service or potentially arbitrary code execution. The exploit is available in the provided link.