Full title: Senkas Kolibri WebServer 2.0 Buffer Overflow Exploit Category: remote exploits Platform: multiple Senkas Kolibri WebServer version 2.0 is vulnerable to remote code execution via an overly long POST request. Sending the exploit will result in a SEH overwrite, which can then be use to redirect execution to a POP POP RET within the application's binary itself, which once executed, will allow the attacker to execute his/her payload located in the HOST field. # 0day.today @ http://0day.today/