Kolibri Webserver version 2.0 buffer overflow exploit with EMET 5.0 and EMET 4.1 partial bypass.
ed20a7e13c0f3d161d5a027baacc2e3b5ba210b5711b12193b08d2d80ae17434
Senkas Kolibri WebServer version 2.0 is vulnerable to remote code execution via an overly long POST request. Sending the exploit will result in a SEH overwrite, which can then be use to redirect execution to a POP POP RET within the application's binary itself, which once executed, will allow the attacker to execute his/her payload located in the HOST field.
e7aca045137e803e2f420610b3f8fd1f46b74e952efdfc1f4fc8d70e6048f942