exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Easy RM To MP3 27.3.700 Buffer Overflow
Posted Dec 22, 2009
Authored by d3b4g

Easy RM To MP3 version 2.7.3.700 buffer overflow exploit for WinXP SP3 that creates a malicious .m3u file.

tags | exploit, overflow
systems | windows
SHA-256 | c0cfbcc3155e96fd913073f82536fe22a167397bd8c6ebc3eb349f2301f1e8e2

Related Files

Mini-Stream RM-MP3 Converter 3.1.2.1.2010.03.30 Buffer Overflow
Posted Jul 26, 2012
Authored by Gianni Gnesa

Mini-Stream RM-MP3 Converter version 3.1.2.1.2010.03.30 buffer overflow exploit with ASLR and DEP bypass.

tags | exploit, overflow
advisories | CVE-2009-1328
SHA-256 | edfd394763830724256e7884bbcdffd800bc4481aa275a07d6e9009bb6093555
MyMP3 Player .m3u Stack Buffer Overflow
Posted Jul 22, 2012
Authored by Daniel Romero Perez

MyMP3 Player version 3.02.067 stack buffer overflow exploit that has DEP bypass.

tags | exploit, overflow
SHA-256 | 26fb8d8b3b8d79981eff51ee010ac925d0a58319110e69cf26e42f4cdf61d88c
Advanced MP3 Player Infusion 2.01 Shell Upload
Posted Jun 29, 2012
Authored by Sammy FORGIT

Advanced MP3 Player Infusion version 2.01 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 0d53259e616b4161775a0b9272f7b7ef1d1569e48797e4a3ba27a9c8136edeff
Secunia Security Advisory 49735
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Advanced MP3 Player module for PHP-Fusion, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, php
SHA-256 | e3872883589e948f5ab26057b52953a554ab7a2a836bb9741a27a3301a8003d6
PEamp Memory Corruption
Posted Jun 10, 2012
Authored by Ayrbyte

PEamp suffers from a memory corruption vulnerability when handling a malformed .mp3 file.

tags | exploit
SHA-256 | 966cb7a1ea51a0ff2928b968ca176c568dc18df4086b304150197c83f80d2827
Andromeda Streaming MP3 Server 1.9.3.6 Cross Site Scripting
Posted May 9, 2012
Authored by LiquidWorm | Site zeroscience.mk

Andromeda Streaming MP3 Server version 1.9.3.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1ea8c761d7de6074555e51c75cfd706e0affc0f9e9ca8a504823b9ad80bc566e
Mini-Stream RM-MP3 Converter 3.1.2.2 Buffer Overflow
Posted Apr 9, 2012
Authored by SkY-NeT SySteMs

Mini-Stream RM-MP3 Converter version 3.1.2.2 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | 5c6467bd62a0a5e620d36e1ad1b37b51b269aeb6638d1ea5f45b152710400a83
Mobile MP3 Search Engine 2.0 HTTP Response Splitting
Posted Feb 24, 2012
Authored by CorryL

Mobile MP3 Search Engine version 2.0 suffers from a HTTP response splitting vulnerability.

tags | exploit, web
SHA-256 | 4a234a62d9055e4a817636cab81811ebdcb76770efd193cc42471310e95ae02f
Free MP3 Player 1.0 Denial Of Service
Posted Dec 19, 2011
Authored by JaMbA

Free MP3 Player version 1.0 local denial of service exploit that creates a malicious mp3 file.

tags | exploit, denial of service, local
SHA-256 | a8d50ae173920d82786db1c55461ca701b5b672c3a52d83d4da71f924ae15cc9
Free MP3 CD Ripper 1.1 (WAV File) Stack Buffer Overflow
Posted Nov 23, 2011
Authored by Richard Leahy, James Fitts, X-h4ck, Tiago Henriques | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Free MP3 CD Ripper 1.1. The overflow is triggered when an unsuspecting user opens a malicious WAV file.

tags | exploit, overflow
SHA-256 | 52cabca82a0dfc73bbb6605dd7821e894d0813df5915d79ab56fae38896d2e89
Mini-Stream RM-MP3 Converter 3.1.2.1 Buffer Overflow
Posted Nov 14, 2011
Authored by MadjiX, James Fitts, Tiago Henriques | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Mini-Stream RM-MP3 Converter version 3.1.2.1. The overflow is triggered when an unsuspecting victim opens the malicious PLS file.

tags | exploit, overflow
SHA-256 | 5ba000d57dfee2b89374d1cbe0fecbd7000e2d1a915017055f38009808d25ac1
My MP3 Player 3.0 DEP Bypass
Posted Sep 16, 2011
Authored by Blake

My MP3 Player version 3.0 buffer overflow exploit with DEP bypass.

tags | exploit, overflow, bypass
SHA-256 | b54cbd0865162eb25b5c22342efed86f3a18573bfb45a369f7c7720750c06179
Free MP3 CD Ripper 1.1 Local Buffer Overflow
Posted Sep 2, 2011
Authored by KedAns-Dz, X-h4ck | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in version 1.1 of Free MP3 CD Ripper. By creating a specially crafted .wav file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 7401c2dd0f56ba28e5f6c554d7c4eaa36cfe2ff96cdf148453614fed7e3f7b1f
MP3 CD Converter Professional 5.3.0 Overflow
Posted Aug 12, 2011
Authored by C4SS!0 G0M3S

MP3 CD Converter Professional version 5.3.0 universal DEP bypass exploit.

tags | exploit, overflow
SHA-256 | 21a25559ac2b37f486bbc7fb5521c61f65b9c2ac0710f36c39e9f89df0fbd316
A-PDF All To MP3 2.3.0 Buffer Overflow
Posted Aug 11, 2011
Authored by C4SS!0 G0M3S

A-PDF All to MP3 version 2.3.0 buffer overflow exploit with universal DEP bypass.

tags | exploit, overflow
SHA-256 | 34ca925c17f05ff06ef8691b76e9540bab5c7fa324ab1c360a8da2cfaa19243c
Free CD To MP3 Converter 3.1 Buffer Overflow
Posted Aug 10, 2011
Authored by C4SS!0 G0M3S, KedAns-Dz | Site metasploit.com

Free CD to MP3 Converter version 3.1 universal DEP bypass exploit.

tags | exploit
SHA-256 | d9b3f2964cd5ec872ea7ba3155899d3cf87c2121259b2180725481e47c36ceed
Free CD To MP3 Overflow 3.1 Buffer Overflow
Posted Aug 7, 2011
Authored by C4SS!0 G0M3S

Free CD To MP3 Converter universal buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | 1fa31bc3bb26d99cbbe2f43552eb1367a924b3b1b7387d71f51e1eb8b03054a9
KMPlayer 3.0.0.1440 Buffer Overflow
Posted Jun 12, 2011
Authored by dookie, xsploited Security, ronin

KMPlayer version 3.0.0.1440 buffer overflow exploit that creates a malicious .mp3 file. It is written for Windows 7 and has ASLR bypass.

tags | exploit, overflow
systems | windows
SHA-256 | 1540c6fca8bfe93e9d337d8daa39356863f9fac8e3c72991321f1895865f6e42
KMPlayer 3.0.0.1440 Buffer Overflow
Posted Jun 7, 2011
Authored by dookie, ronin

KMPlayer version 3.0.0.1440 buffer overflow exploit with DEP bypass that creates a malicious mp3 file.

tags | exploit, overflow
SHA-256 | 132a8a91ab46b94954a941964bc52cf820ea67a4c8ae0be94d92b5e07513bded
A-PDF WAV To MP3 Converter 1.2.0 DEP Bypass
Posted May 12, 2011
Authored by h1ch4m

A-PDF WAV to MP3 Converter version 1.2.0 buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | de07a2a51fe0ef6670abcb2c3394e778bb131579bf58a84567d598ab9cb9a2c5
A-PDF All To MP3 Converter 2.0.0 DEP Bypass
Posted May 12, 2011
Authored by h1ch4m

A-PDF All to MP3 Converter version 2.0.0 buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | 32f048ae8de35c1ad8a82f9bdf73b82b482ec2ee35ab8228fde6fd83a9edebc1
SoftMP3 SQL Injection
Posted Apr 25, 2011
Authored by mArTi

SoftMP3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3e3fa9a3112dc4fcb3d914db99f6e43ca588fc500f2d4146a431755c17758bc7
Mandriva Linux Security Advisory 2011-061
Posted Apr 1, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-061 - oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain pointer arithmetic, which might allow remote attackers to obtain sensitive memory contents and cause a denial of service via a crafted file that triggers an out-of-bounds read. vorbis_dec.c in FFmpeg 0.5 uses an assignment operator when a comparison operator was intended, which might allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that modifies a loop counter and triggers a heap-based buffer overflow. Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream. FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause utils.c to use inconsistent codec types and identifiers, which causes the mp3 decoder to process a pointer for a video structure, leading to a stack-based buffer overflow. FFmpeg 0.5 allows remote attackers to cause a denial of service via a crafted file that triggers an infinite loop. The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows remote attackers to cause a denial of service via a crafted AVI file that triggers a divide-by-zero error. Array index error in vorbis_dec.c in FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Vorbis file that triggers an out-of-bounds read. flicvideo.c in libavcodec 0.6 and earlier in FFmpeg, as used in MPlayer and other products, allows remote attackers to execute arbitrary code via a crafted flic file, related to an arbitrary offset dereference vulnerability. Fix memory corruption in WMV parsing. libavcodec/vorbis_dec.c in the Vorbis decoder in FFmpeg 0.6.1 and earlier allows remote attackers to cause a denial of service via a crafted.ogg file, related to the vorbis_floor0_decode function. Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted WebM file, related to buffers for Fix heap corruption crashes. Fix invalid reads in VC-1 decoding. And several additional vulnerabilities originally discovered by Google Chrome developers were also fixed with this advisory. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4632, CVE-2009-4633, CVE-2009-4634, CVE-2009-4635, CVE-2009-4636, CVE-2009-4639, CVE-2009-4640, CVE-2010-3429, CVE-2010-3908, CVE-2010-4704, CVE-2011-0480, CVE-2011-0722, CVE-2011-0723
SHA-256 | d6c3a6eef98903a7ea2ba82b2d03e09f18e14c6a66027b06acba91c42c4f166e
Mandriva Linux Security Advisory 2011-060
Posted Apr 1, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-060 - oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain pointer arithmetic, which might allow remote attackers to obtain sensitive memory contents and cause a denial of service via a crafted file that triggers an out-of-bounds read. vorbis_dec.c in FFmpeg 0.5 uses an assignment operator when a comparison operator was intended, which might allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that modifies a loop counter and triggers a heap-based buffer overflow. Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream. FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause utils.c to use inconsistent codec types and identifiers, which causes the mp3 decoder to process a pointer for a video structure, leading to a stack-based buffer overflow. The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows remote attackers to cause a denial of service via a crafted AVI file that triggers a divide-by-zero error. Array index error in vorbis_dec.c in FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Vorbis file that triggers an out-of-bounds read. flicvideo.c in libavcodec 0.6 and earlier in FFmpeg, as used in MPlayer and other products, allows remote attackers to execute arbitrary code via a crafted flic file, related to an arbitrary offset dereference vulnerability. libavcodec/vorbis_dec.c in the Vorbis decoder in FFmpeg 0.6.1 and earlier allows remote attackers to cause a denial of service via a crafted.ogg file, related to the vorbis_floor0_decode function. And several additional vulnerabilities originally discovered by Google Chrome developers were also fixed with this advisory.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4632, CVE-2009-4633, CVE-2009-4634, CVE-2009-4635, CVE-2009-4639, CVE-2009-4640, CVE-2010-3429, CVE-2010-4704
SHA-256 | 72bda34e1a85cce233e9d75d74936eddfb6b008e8d850ac1e6308d2a939ee87b
Mandriva Linux Security Advisory 2011-059
Posted Apr 1, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-059 - Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream. FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause utils.c to use inconsistent codec types and identifiers, which causes the mp3 decoder to process a pointer for a video structure, leading to a stack-based buffer overflow. The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows remote attackers to cause a denial of service via a crafted AVI file that triggers a divide-by-zero error. And several additional vulnerabilities originally discovered by Google Chrome developers were also fixed with this advisory. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4634, CVE-2009-4635, CVE-2009-4639
SHA-256 | 0a8a1f1e04b5536ef974768d7446ef1b4f3284aa9b838d04fa6ef7005a46de35
Page 1 of 4
Back1234Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close