Email address | private |
---|---|
First Active | 2010-05-10 |
Last Active | 2011-06-12 |
KMPlayer version 3.0.0.1440 buffer overflow exploit that creates a malicious .mp3 file. It is written for Windows 7 and has ASLR bypass.
1540c6fca8bfe93e9d337d8daa39356863f9fac8e3c72991321f1895865f6e42
This Metasploit module exploits a vulnerability in SPlayer versions 3.7 and below. When SPlayer requests the URL of a media file (video or audio), it is possible to gain arbitrary remote code execution due to a buffer overflow caused by an exceeding length of data as the 'Content-Type' parameter.
6f2550278cc4becee8ea4249e308c87e89641d1cb88d107eb931d8849ab4c457
SPlayer versions 3.7 build 2055 and below buffer overflow exploit that spawns calc.exe.
7199ee82c6de7166007e5758895e7672eab30f0276b859700b858711982a7e8c
VideoSpirit Pro versions 1.68 and below local buffer overflow proof of concept exploit.
0f6178984474d71343f55c1f89fd67032bfd3a92d83c1780f4e6dd53e1f14253
Aesop GIF Creator versions 2.1 and below buffer overflow exploit that creates a malicious .aep file.
61914cba537898b62cc6712d77ea4ba353aff9349752feb03f24d19053973d1b
Video Charge Studio versions 2.9.5.643 and below buffer overflow exploit that creates a malicious .vsc file.
57134f251d8f297f6b415d0cca414534a2d8d8b957b3df0d71cef23c631f8526
NCH Officeintercom versions 5.20 and below suffer from a remote denial of service vulnerability.
0349fd7fada5cbd742c13d7e903d7459e061ee4eda5152e3d6d7ba0d7ac4379d
A vulnerability exists in the way Disk Pulse Server version 2.2.34 process a remote client's "GetServerInfo" request. The vulnerability is caused due to a boundary error in libpal.dll when handling network messages and can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 9120.
702797dbe6d5419910ba57e07ca0672c234f8c8fd8f21cb8293adbf04f2202a2
Sync Breeze Server version 2.2.30 remote buffer overflow exploit.
2ea4239f4bc3ba3677f10749cd14e33e6c090fa74c5f4bbe8fc6a7a59f85284f
Hanso Player version 1.3.0 proof of concept denial of service exploit that creates a malicious .m3u file.
0e4bf5f7db197fe1e20a2194bc5f7a87d1e512e70d7efa00d8c3528cc4b47bb3
Windows Live! Messenger build 14.0.8117.416 DLL hijacking exploit that leverages msgsres.dll.
8f41614b9670b0009e3b2f9a5db84ff8e5d796f40b83b797325dd6ac9e464e82
Windows Live! Messenger build 1.0.8117.416 DLL hijacking exploit.
08db161142f46d3b051c43c0771089a954cb6a8d9d9fe8b00ecc6defdd73c517
Adobe Reader 9 DLL hijacking exploit that leverages sqlite.dll.
77ce864ec9546ec25e67e876a16d76285a5af8641f992e459694252acefe1d95
Autodesk AutoCAD 2007 DLL hijacking exploit.
5c5956599e539bd880732e5c73d896d926501b53317a1de04e72e54345c392f5
Hyplay version 1.2.0326.1 local denial of service proof of concept exploit that creates a malicious .asx file.
22444c27310798a4fc9ad9164e2384223ce3fedb5b3534fbef121360daf711ae