9.8
CVSSv3

CVE-2019-16724

Published: 24/09/2019 Updated: 26/09/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 758
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

File Sharing Wizard 1.5.0 allows a remote malicious user to obtain arbitrary code execution by exploiting a Structured Exception Handler (SEH) based buffer overflow in an HTTP POST parameter, a similar issue to CVE-2010-2330 and CVE-2010-2331.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

upredsun file sharing wizard 1.5.0

Exploits

import socket from struct import * # Exploit Title: File sharing wizard 'post' remote SEH overflow # Date: 9/23/2019 # Exploit Author: x00pwn # Software Link: file-sharing-wizardsoft112com/ # Version: 150 # Tested on: Windows 7 # CVE : CVE-2019-16724 # File-sharing-wizard-seh #----------------------------------------------# # Bad cha ...
File Sharing Wizard version 150 POST SEH buffer overflow exploit ...

Github Repositories

CVE-2019-18655 metasploit module. SEH based buffer overflow in file sharing wizard app v.1.5.0.

CVE-2019-18655 metasploit module SEH based buffer overflow in file sharing wizard app v150 CVE summary: File Sharing Wizard version 150 is affected of Structured Exception Handler based buffer overflow vulnerability An unauthenticated attacker is able to perform remote command execution and obtain a command shell by sending a HTTP GET request including the malicious pay

Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification

Buffer overflow Windows exploit development practice - 50 proof of concepts What this repo is: After obtaining my OSCP, as preparation for my upcoming OSCE certification I challenged myself to re-write 50 proof of concepts for pre-existing exploits in software, all of which are Windows based NO looking at the original POC 😣 no cheating Secondly, this repo contains a handful

Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification

Buffer overflow Windows exploit development practice - 50 proof of concepts What this repo is: After obtaining my OSCP, as preparation for my upcoming OSCE certification I challenged myself to re-write 50 proof of concepts for pre-existing exploits in software, all of which are Windows based NO looking at the original POC 😣 no cheating Secondly, this repo contains a handful

Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification

Buffer overflow Windows exploit development practice - 50 proof of concepts What this repo is: After obtaining my OSCP, as preparation for my upcoming OSCE certification I challenged myself to re-write 50 proof of concepts for pre-existing exploits in software, all of which are Windows based NO looking at the original POC 😣 no cheating Secondly, this repo contains a handful

Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification

Buffer overflow Windows exploit development practice - 50 proof of concepts What this repo is: After obtaining my OSCP, as preparation for my upcoming OSCE certification I challenged myself to re-write 50 proof of concepts for pre-existing exploits in software, all of which are Windows based NO looking at the original POC 😣 no cheating Secondly, this repo contains a handful

Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification

Buffer overflow Windows exploit development practice - 50 proof of concepts What this repo is: After obtaining my OSCP, as preparation for my upcoming OSCE certification I challenged myself to re-write 50 proof of concepts for pre-existing exploits in software, all of which are Windows based NO looking at the original POC 😣 no cheating Secondly, this repo contains a handful

Contains an exploit code of a SEH attack against the file sharing wizard 1.5.0 application and a report explaining the process

Structured-Exception-Handling-SEH-Buffer-Overflow Contains an exploit code of a SEH attack against the file sharing wizard 150 application and a report explaining the process CVE-2019-16724 File Sharing Wizard 150 allows a remote attacker to obtain arbitrary code execution by exploiting a Structured Exception Handler (SEH) based buffer overflow in an HTTP POST parameter, a

Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification

Buffer overflow Windows exploit development practice - 50 proof of concepts What this repo is: After obtaining my OSCP, as preparation for my upcoming OSCE certification I challenged myself to re-write 50 proof of concepts for pre-existing exploits in software, all of which are Windows based NO looking at the original POC 😣 no cheating Secondly, this repo contains a handful

Buffer overflow Windows exploit development practice - 50 proof of concepts What this repo is: After obtaining my OSCP, as preparation for my upcoming OSCE certification I challenged myself to re-write 50 proof of concepts for pre-existing exploits in software, all of which are Windows based NO looking at the original POC 😣 no cheating Secondly, this repo contains a handful