This exploit allows an attacker to retrieve the admin username and hash from a vulnerable Fuzzylime Forum 1.0 installation. The vulnerability is caused by the lack of proper input validation in the 'topic' parameter of the 'low.php' script. By injecting a specially crafted SQL query, the attacker can retrieve sensitive information from the database.
This exploit causes a crash in Oracle VM VirtualBox 4.3.28. The exploit involves opening VirtualBox, pressing Ctrl+I, choosing a file, and clicking next multiple times.
This module exploits a vulnerability in the OpenNMS Java object which allows an unauthenticated attacker to run arbitary code against the system.
The PoC exploit exploits a vulnerability in Safari for Windows by bouncing through Firefox via the Gopher protocol, passing on unfiltered input for the -chrome argument that Firefox exposes. It launches cmd.exe with any arguments specified in the call to the process.run method.
NtLoadKeyEx takes a flag to open a registry hive read only, if one of the hive files cannot be opened for read access it will revert to write mode and also impersonate the calling process. This can leading to EoP if a user controlled hive is opened in a system service.
The isolated private namespace created by ierutils has an insecure Boundary Descriptor which allows any non-appcontainer sandbox process (such as chrome) or other users on the same system to gain elevated permissions on the namespace directory which could lead to elevation of privilege.
We have encountered a Windows kernel crash in the nt!RtlValidRelativeSecurityDescriptor function invoked by nt!CmpValidateHiveSecurityDescriptors while loading corrupted registry hive files. An example of a crash log excerpt generated after triggering the bug is shown below:---KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)This is a very common bugcheck. Usually the exception address pinpointsthe driver/function that caused the problem. Always note this addressas well as the link date of the driver/image that contains this address.Some common problems are exception code 0x80000003. This means a hardcoded breakpoint or assertion was hit, but this system was booted/NODEBUG. This is not supposed to happen as developers should never havehardcoded breakpoints in retail code, but ...If this happens, make sure a debugger gets connected, and thesystem is booted /DEBUG. This will let us see why this breakpoint ishappening.Arguments:Arg1: c0000005, The exception code that was not handledArg2: 81815974, The address that the exception occurred atArg3: 80795644, Trap FrameArg4: 00000000Debugging Details:------------------[...]STACK_TEXT:807956c4 81814994 a4f3f098 0125ffff 00000000 nt!RtlValidRelativeSecurityDescriptor+0x5b807956fc 818146ad 03010001 80795728 80795718 nt!CmpValidateHiveSecurityDescriptors+0x24b8079573c 8181708f 03010001 80000560 80000540 nt!CmCheckRegistry+0xd880795798 817eafa0 80795828 00000002 00000000 nt!CmpInitializeHive+0x55c8079585c 817ebd85 80795bb8 00000000 807959f4 nt!CmpInitHiveFromFile+0x1be807959c0 817f3aae 80795bb8 80795a88 80795a0c nt!CmpCmdHiveOpen+0x5080795acc 817ec3b8 80795b90 80795bb8 00000010 nt!CmLoadKey+0x45980795c0c 81682dc6 002afc90 00000000 00000010 nt!NtLoadKeyEx+0x56c80795c0c 77066bf4 002afc90 00000000 00000010 nt!KiSystemServicePostCallWARNING: Frame IP not in any known module. Following frames may be wrong.002afcf8 00000000 000
The Perl script uses a valid username and password combination to perform an SQL injection attack. By exploiting the SQL injection vulnerability, the script elevates the privileges of the user to administrative.
The win32k!itrp_GetCVTEntryFast function in Windows kernel crashes when processing corrupted TTF font files, leading to a PAGE_FAULT_IN_NONPAGED_AREA error. This can be triggered by a read or write operation on the fb000078 memory address. The bug occurs in the win32k.sys module and affects the csrss.exe process. The crash is caused by an invalid system memory reference.
This vulnerability allows an attacker to send a special request to the SAPSTARTSRV process port and conduct stack buffer overflow (recursion) on the SAP server.