what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Easy MOV Converter 1.4.24 Denial Of Service
Posted Mar 12, 2017
Authored by Muhann4d

Easy MOV Converter version 1.4.24 Enter User Name field SEH overwrite proof of concept denial of service exploit.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | b8bfca7b211e8d7ece0c4ec00879cf3a9fb3c8ebce9518bb4d56f9b7bc4df15f

Related Files

Mini-Stream RM-MP3 Converter 3.0.0.7 Universal Stack Overflow
Posted Mar 28, 2010
Authored by mat

Mini-Stream RM-MP3 Converter version 3.0.0.7 universal stack buffer overflow exploit that creates a malicious .pls file.

tags | exploit, overflow
SHA-256 | 51ff695b5697d6c23b1235c10369f39c2c77956f7c56cdb643bc362cf5d2ec82
Xilisoft Video Converter Buffer Overflow
Posted Mar 20, 2010
Authored by ItSecTeam

Xilisoft Video Converter stack buffer overflow exploit that creates a malicious .yuv file.

tags | exploit, overflow
SHA-256 | c67bd24cad9a2761bf38f7588eb9918b0554ca773ab5c83ba5fb00d90a5e2b07
Mandriva Linux Security Advisory 2010-039
Posted Feb 17, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-039 - Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-4274
SHA-256 | 7a5d6b7bf889ee556ed937e2c8e9f9a9b35d1e918e402269a20973667ee185ee
Secunia Security Advisory 38166
Posted Jan 17, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Unit Converter extension for TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 84319168e76f65351fc2b6a1520f0b5984f52f3e8b9980ed04a23f0fd44df1a2
Switch Sound File Converter Denial Of Service
Posted Jan 4, 2010
Authored by Jacky

Switch Sound File Converter .mpga buffer overflow denial of service vulnerability.

tags | exploit, denial of service, overflow
SHA-256 | 9d8bb2bdf1b88c01ae83fe35d930c95b714c14fddd4b1b4bb476d7dfe01ceb0c
SoftCab Sound Converter Active-X Insecure Method
Posted Dec 30, 2009
Authored by ThE g0bL!N

SoftCab Sound Converter Active-X insecure method exploit that leverages sndConverter.ocx.

tags | exploit, activex
SHA-256 | 6e5173c9b88908851361b839d7d5a9014ca1e5e3983c4e7cdce6e75584650df5
Secunia Security Advisory 37967
Posted Dec 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ThE g0bL!N has discovered a vulnerability in SoftCab Sound Converter ActiveX, which can be exploited by malicious people to overwrite arbitrary files.

tags | advisory, arbitrary, activex
SHA-256 | 66bf0ce8be1b3c9638fab8900eff83e16b35dab50d31a52f11333dc8ccfa60e6
Easy RM To MP3 Converter 2.7.3.700 Buffer Overflow
Posted Dec 12, 2009
Authored by Vinod Sharma

Easy RM to MP3 Converter version 2.7.3.700 WinXP SP2 buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
systems | windows
SHA-256 | 45d99f278af1b5cd1081f086d57918b4e30a7a2f1883a3f06b5d27e9d890d2d1
iDEFENSE Security Advisory 2009-12-08.2
Posted Dec 10, 2009
Authored by iDefense Labs, Sean Larsson, Jun Mao | Site idefense.com

iDefense Security Advisory 12.08.09 - Remote exploitation of an integer overflow vulnerability in Microsoft Corp.'s WordPad could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense has confirmed the existence of this vulnerability in WordPad version 5.1 for Windows XP SP3 and SP2. Other versions of Windows may also be affected. However, Vista and Server 2008 are not affected as they no longer contain the Word97 converter.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2009-2506
SHA-256 | 4a7ab1715bf7bf9f3e49fd7c137a769d655d1bc36bc533cc4eec0e9fb9cba6a6
AIMP2 Audio Converter Playlist Buffer Overflow
Posted Nov 17, 2009
Authored by corelanc0d3r

AIMP2 versions 2.51 build 330 and below audio converter playlist buffer overflow exploit.

tags | exploit, overflow
SHA-256 | c6e39bb3fcec1877067eb985ee4f07a6fd968d11e76815fc2c325d912e99073b
Secunia Security Advisory 36975
Posted Oct 12, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Free WMA MP3 Converter, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 79ae1ecf9e101ce5b864f391c6d04c5c86632b36cb8fdd14f92986e8ef2fd9bb
Free WMA MP3 Converter 1.1 Buffer Overflow
Posted Oct 8, 2009
Authored by KriPpLer | Site x-sploited.com

Free WMA MP3 Converter version 1.1 local buffer overflow exploit that creates a malicious .wav file and executes a reverse shell.

tags | exploit, overflow, shell, local
SHA-256 | 91a500175b9cf71b97054fc07b9ac5c5a2c5625d18c5b8c212a166f6e30ed90d
Charm Real Converter Pro 6.6 Denial Of Service
Posted Sep 19, 2009
Authored by the_Edit0r

Charm Real Converter Pro version 6.6 Active-X related denial of service exploit that leverages prct3260.ocx.

tags | exploit, denial of service, activex
SHA-256 | 1b6423e7f3691fb3e6474bfdfdb474a4c9dacedb9a5a9b3a6806e6605eed5c64
AIMP2 Audio Converter 2.53b330 Crash
Posted Sep 1, 2009
Authored by mr_me

AIMP2 Audio Converter versions 2.53b330 unicode crash proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 10708455451351ef7cec0ba68ccc6dad1485cf95d267782f2afe3e82c6d42d5e
Easy RM To MP3 Converter Stack Overflow
Posted Jul 17, 2009
Authored by Stack | Site v4-team.com

Easy RM to MP3 Converter universal stack overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | a6c79f72fa7534bd1571a0879a0f13a4a742742f81da437fda8e1f9ca7bb5845
Easy RM To MP3 Converter 2.7.3.700 Overflow
Posted Jul 17, 2009
Authored by Crazy_Hacker | Site sec-t.com

Easy RM to MP3 Converter version 2.7.3.700 universal buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | c63ac24395407c2b43dbc53554c6dace1b3d8ff1d5acf6d4e413b5c170eab26e
Mini-stream RM-MP3 Converter Overflow
Posted May 8, 2009
Authored by G4N0K

Mini-stream RM-MP3 Converter version 3.0.0.7 local buffer overflow exploit that creates a malicious .ASX file.

tags | exploit, overflow, local
SHA-256 | 0d5067f2e808142b7250cbd3ecb26332b9eee7d1490dd3fc492b8303bb2f35d1
Mini-stream RM-MP3 Converter Overflow
Posted May 8, 2009
Authored by G4N0K

Mini-stream RM-MP3 Converter version 3.0.0.7 local buffer overflow exploit that creates a malicious .RAM file.

tags | exploit, overflow, local
SHA-256 | 553222a06e8cf71eb90a3d6b522d12ac3152ab7f5ef63d9258df49f2e9173104
Mini-stream ASX To MP3 Converter .RAM Overflow
Posted May 8, 2009
Authored by G4N0K

Mini-stream ASX to MP3 Converter version 3.0.0.7 local buffer overflow exploit that creates a malicious .RAM file.

tags | exploit, overflow, local
SHA-256 | e22d58e0d3c3c23a8024beec2673b7cedc58e93558261b1687379a50ef86591d
Mini-stream Ripper 3.0.1.1 .ASX Buffer Overflow
Posted May 8, 2009
Authored by G4N0K

Mini-stream ASX to MP3 Converter version 3.0.1.1 HREF local buffer overflow exploit that creates a malicious .ASX file.

tags | exploit, overflow, local
SHA-256 | 8462c810263276cdfeb2042a37ca41fa0a443821ccbcee6a7a68a797409f176b
Mini-stream Ripper 3.0.1.1 Buffer Overflow
Posted May 8, 2009
Authored by G4N0K

Mini-stream ASX to MP3 Converter version 3.0.0.7 local buffer overflow exploit that creates a malicious .RAM file.

tags | exploit, overflow, local
SHA-256 | 14d40d0d27e1f725e17824ff28026d8373527df6347adc8a32e010a7bf3f5f6b
Mini-stream ASX To MP3 Converter Overflow
Posted May 8, 2009
Authored by G4N0K

Mini-stream ASX to MP3 Converter version 3.0.0.7 HREF local buffer overflow exploit that creates a malicious .ASX file.

tags | exploit, overflow, local
SHA-256 | 8fb6c988b7e37402fec505f027138a7062429dae49de9c5e3a58bffb251c383d
iDEFENSE Security Advisory 2009-04-14.2
Posted Apr 15, 2009
Authored by iDefense Labs, Sean Larsson, Jun Mao | Site idefense.com

iDefense Security Advisory 04.14.09 - Remote exploitation of a stack buffer overflow vulnerability in Microsoft Corp.'s WordPad could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when parsing the content of a Word97 format file. When reading in the data, the code uses a 32-bit integer from the file to check a buffer length while using the lower 16-bit value to do the actual copy. This results in a stack buffer overflow. This stack buffer is overwritten with data from the file. iDefense has confirmed the existence of this vulnerability in Wordpad on Windows 2000 SP4. Windows XP SP3 is not affected. Vista and Server 2008 are not affected as they no longer contain the Word97 converter.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2009-0235
SHA-256 | 619400cb987192e72c2d05da51ff52e996d4d4c10414389a155b0889e87cb2bf
iDEFENSE Security Advisory 2009-04-14.1
Posted Apr 15, 2009
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 04.14.09 - Exploitation of a stack corruption vulnerability in Microsoft Corp.'s Word 2000 WordPerfect 6.x Converter could allow an attacker to execute code in the context of the current user. Microsoft Word is able to open documents created in other applications by transparently applying a filter module which converts them to a format Word can use. The WordPerfect 6.x converter from Office 2000 fails to perform sufficient sanity checking on input files. A maliciously constructed WordPerfect document can cause potentially exploitable stack corruption. iDefense Labs have confirmed that the WordPerfect 6.x converter (WPFT632.CNV, with file version 1998.1.27.0) in Microsoft Word 2000 Service Pack 3 is vulnerable. However, the version of this converter installed with Word 2003 is not affected by this vulnerability.

tags | advisory
advisories | CVE-2009-0088
SHA-256 | d7e06c594ee675783098ca1a2f12b2ee798b05b631ffdf21d98e79bb64fc7399
Secunia Security Advisory 34653
Posted Apr 14, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cyber-Zone has discovered a vulnerability in Mini-stream RM-MP3 Converter, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 1d64c001a32bfbd4f0141144a0c834e962c1841bbe7dd13bec0588b84e05afc2
Page 4 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close