CloudMe version 1.11.2 exploit that uses MSVCRT.System to create a new user (boku:0v3R9000!) and add the new user to the Administrators group. A requirement of successful exploitation is the CloudMe.exe process must be running as administrator.
fa72c3ffb403b1cf08f01966de80e025ee648636329bef78008faa0a5aee32e9
CloudMe version 1.11.2 SEH buffer overflow exploit.
dd926be7b4fc7bcef00625aa9853f7d8daaf02f5fd5828b55aa7fe3e2fd4c552
CloudMe version 1.11.2 buffer overflow proof of concept exploit. Original vulnerability discovered by hyp3rlinx.
ed65bed8b662b7e2d11fe184fc29b26b92fddd08fc3a706685a4125ca60acc16
CloudMe Sync version 1.11.2 buffer overflow exploit with DEP bypass for WoW64.
3343c0221cb885f3c36ac1405e8f04a31e4489b88140a1e1b13a5b4a5358cb82
CloudMe Sync version 1.11.2 buffer overflow exploit with egghunter.
cb18c11b389ba778fe5c6c45d0a84378dbf742867018039cc6bb54ee0bdad380
This Metasploit module exploits a stack buffer overflow in Cloudme version 1.8.x and 1.9.x.
89e2b67fa70ea47b854afcbf57cff077380559cd4f00fe5f4a75523fe83aa13e
CloudMe Sync version 1.9.2 remote buffer overflow exploit. Tested on Win7 32b SP1.
b88d054a7610fd70f618975d2a0ff376869824def2b4846b8ee33666bc44e702
This Metasploit module exploits a stack-based buffer overflow vulnerability in the CloudMe Sync version 1.10.9 client application. This Metasploit module has been tested successfully on Windows 7 SP1 x86.
e772df2bb9bc2559a8e1ce1faef1106d0f6d2691866412f3c6f64ad143790589
CloudMe Sync versions 1.10.9 and below suffer from an unauthenticated remote buffer overflow vulnerability.
307a174d4e2ca11e05d03cb3342637326e0256f73524c109407bcf4616f06332