exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Digital Amp MP3 3.1 Crash
Posted Feb 4, 2010
Authored by SkuLL-HacKeR

Digital Amp MP3 version 3.1 local crash proof of concept exploit.

tags | exploit, denial of service, local, proof of concept
SHA-256 | 27eb43e29a38dc9454042da6df4c9bf74e574e23934ec53b8553a61e7dfa3b77

Related Files

Mini-Stream RM-MP3 Converter 3.1.2.1.2010.03.30 Buffer Overflow
Posted Jul 26, 2012
Authored by Gianni Gnesa

Mini-Stream RM-MP3 Converter version 3.1.2.1.2010.03.30 buffer overflow exploit with ASLR and DEP bypass.

tags | exploit, overflow
advisories | CVE-2009-1328
SHA-256 | edfd394763830724256e7884bbcdffd800bc4481aa275a07d6e9009bb6093555
MyMP3 Player .m3u Stack Buffer Overflow
Posted Jul 22, 2012
Authored by Daniel Romero Perez

MyMP3 Player version 3.02.067 stack buffer overflow exploit that has DEP bypass.

tags | exploit, overflow
SHA-256 | 26fb8d8b3b8d79981eff51ee010ac925d0a58319110e69cf26e42f4cdf61d88c
Advanced MP3 Player Infusion 2.01 Shell Upload
Posted Jun 29, 2012
Authored by Sammy FORGIT

Advanced MP3 Player Infusion version 2.01 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 0d53259e616b4161775a0b9272f7b7ef1d1569e48797e4a3ba27a9c8136edeff
Secunia Security Advisory 49735
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Advanced MP3 Player module for PHP-Fusion, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, php
SHA-256 | e3872883589e948f5ab26057b52953a554ab7a2a836bb9741a27a3301a8003d6
PEamp Memory Corruption
Posted Jun 10, 2012
Authored by Ayrbyte

PEamp suffers from a memory corruption vulnerability when handling a malformed .mp3 file.

tags | exploit
SHA-256 | 966cb7a1ea51a0ff2928b968ca176c568dc18df4086b304150197c83f80d2827
Andromeda Streaming MP3 Server 1.9.3.6 Cross Site Scripting
Posted May 9, 2012
Authored by LiquidWorm | Site zeroscience.mk

Andromeda Streaming MP3 Server version 1.9.3.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1ea8c761d7de6074555e51c75cfd706e0affc0f9e9ca8a504823b9ad80bc566e
Mini-Stream RM-MP3 Converter 3.1.2.2 Buffer Overflow
Posted Apr 9, 2012
Authored by SkY-NeT SySteMs

Mini-Stream RM-MP3 Converter version 3.1.2.2 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | 5c6467bd62a0a5e620d36e1ad1b37b51b269aeb6638d1ea5f45b152710400a83
Mobile MP3 Search Engine 2.0 HTTP Response Splitting
Posted Feb 24, 2012
Authored by CorryL

Mobile MP3 Search Engine version 2.0 suffers from a HTTP response splitting vulnerability.

tags | exploit, web
SHA-256 | 4a234a62d9055e4a817636cab81811ebdcb76770efd193cc42471310e95ae02f
Free MP3 Player 1.0 Denial Of Service
Posted Dec 19, 2011
Authored by JaMbA

Free MP3 Player version 1.0 local denial of service exploit that creates a malicious mp3 file.

tags | exploit, denial of service, local
SHA-256 | a8d50ae173920d82786db1c55461ca701b5b672c3a52d83d4da71f924ae15cc9
Free MP3 CD Ripper 1.1 (WAV File) Stack Buffer Overflow
Posted Nov 23, 2011
Authored by Richard Leahy, James Fitts, X-h4ck, Tiago Henriques | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Free MP3 CD Ripper 1.1. The overflow is triggered when an unsuspecting user opens a malicious WAV file.

tags | exploit, overflow
SHA-256 | 52cabca82a0dfc73bbb6605dd7821e894d0813df5915d79ab56fae38896d2e89
Mini-Stream RM-MP3 Converter 3.1.2.1 Buffer Overflow
Posted Nov 14, 2011
Authored by MadjiX, James Fitts, Tiago Henriques | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Mini-Stream RM-MP3 Converter version 3.1.2.1. The overflow is triggered when an unsuspecting victim opens the malicious PLS file.

tags | exploit, overflow
SHA-256 | 5ba000d57dfee2b89374d1cbe0fecbd7000e2d1a915017055f38009808d25ac1
My MP3 Player 3.0 DEP Bypass
Posted Sep 16, 2011
Authored by Blake

My MP3 Player version 3.0 buffer overflow exploit with DEP bypass.

tags | exploit, overflow, bypass
SHA-256 | b54cbd0865162eb25b5c22342efed86f3a18573bfb45a369f7c7720750c06179
Free MP3 CD Ripper 1.1 Local Buffer Overflow
Posted Sep 2, 2011
Authored by KedAns-Dz, X-h4ck | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in version 1.1 of Free MP3 CD Ripper. By creating a specially crafted .wav file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 7401c2dd0f56ba28e5f6c554d7c4eaa36cfe2ff96cdf148453614fed7e3f7b1f
MP3 CD Converter Professional 5.3.0 Overflow
Posted Aug 12, 2011
Authored by C4SS!0 G0M3S

MP3 CD Converter Professional version 5.3.0 universal DEP bypass exploit.

tags | exploit, overflow
SHA-256 | 21a25559ac2b37f486bbc7fb5521c61f65b9c2ac0710f36c39e9f89df0fbd316
A-PDF All To MP3 2.3.0 Buffer Overflow
Posted Aug 11, 2011
Authored by C4SS!0 G0M3S

A-PDF All to MP3 version 2.3.0 buffer overflow exploit with universal DEP bypass.

tags | exploit, overflow
SHA-256 | 34ca925c17f05ff06ef8691b76e9540bab5c7fa324ab1c360a8da2cfaa19243c
Free CD To MP3 Converter 3.1 Buffer Overflow
Posted Aug 10, 2011
Authored by C4SS!0 G0M3S, KedAns-Dz | Site metasploit.com

Free CD to MP3 Converter version 3.1 universal DEP bypass exploit.

tags | exploit
SHA-256 | d9b3f2964cd5ec872ea7ba3155899d3cf87c2121259b2180725481e47c36ceed
Free CD To MP3 Overflow 3.1 Buffer Overflow
Posted Aug 7, 2011
Authored by C4SS!0 G0M3S

Free CD To MP3 Converter universal buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | 1fa31bc3bb26d99cbbe2f43552eb1367a924b3b1b7387d71f51e1eb8b03054a9
KMPlayer 3.0.0.1440 Buffer Overflow
Posted Jun 12, 2011
Authored by dookie, xsploited Security, ronin

KMPlayer version 3.0.0.1440 buffer overflow exploit that creates a malicious .mp3 file. It is written for Windows 7 and has ASLR bypass.

tags | exploit, overflow
systems | windows
SHA-256 | 1540c6fca8bfe93e9d337d8daa39356863f9fac8e3c72991321f1895865f6e42
KMPlayer 3.0.0.1440 Buffer Overflow
Posted Jun 7, 2011
Authored by dookie, ronin

KMPlayer version 3.0.0.1440 buffer overflow exploit with DEP bypass that creates a malicious mp3 file.

tags | exploit, overflow
SHA-256 | 132a8a91ab46b94954a941964bc52cf820ea67a4c8ae0be94d92b5e07513bded
A-PDF WAV To MP3 Converter 1.2.0 DEP Bypass
Posted May 12, 2011
Authored by h1ch4m

A-PDF WAV to MP3 Converter version 1.2.0 buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | de07a2a51fe0ef6670abcb2c3394e778bb131579bf58a84567d598ab9cb9a2c5
A-PDF All To MP3 Converter 2.0.0 DEP Bypass
Posted May 12, 2011
Authored by h1ch4m

A-PDF All to MP3 Converter version 2.0.0 buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | 32f048ae8de35c1ad8a82f9bdf73b82b482ec2ee35ab8228fde6fd83a9edebc1
SoftMP3 SQL Injection
Posted Apr 25, 2011
Authored by mArTi

SoftMP3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3e3fa9a3112dc4fcb3d914db99f6e43ca588fc500f2d4146a431755c17758bc7
Mandriva Linux Security Advisory 2011-061
Posted Apr 1, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-061 - oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain pointer arithmetic, which might allow remote attackers to obtain sensitive memory contents and cause a denial of service via a crafted file that triggers an out-of-bounds read. vorbis_dec.c in FFmpeg 0.5 uses an assignment operator when a comparison operator was intended, which might allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that modifies a loop counter and triggers a heap-based buffer overflow. Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream. FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause utils.c to use inconsistent codec types and identifiers, which causes the mp3 decoder to process a pointer for a video structure, leading to a stack-based buffer overflow. FFmpeg 0.5 allows remote attackers to cause a denial of service via a crafted file that triggers an infinite loop. The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows remote attackers to cause a denial of service via a crafted AVI file that triggers a divide-by-zero error. Array index error in vorbis_dec.c in FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Vorbis file that triggers an out-of-bounds read. flicvideo.c in libavcodec 0.6 and earlier in FFmpeg, as used in MPlayer and other products, allows remote attackers to execute arbitrary code via a crafted flic file, related to an arbitrary offset dereference vulnerability. Fix memory corruption in WMV parsing. libavcodec/vorbis_dec.c in the Vorbis decoder in FFmpeg 0.6.1 and earlier allows remote attackers to cause a denial of service via a crafted.ogg file, related to the vorbis_floor0_decode function. Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted WebM file, related to buffers for Fix heap corruption crashes. Fix invalid reads in VC-1 decoding. And several additional vulnerabilities originally discovered by Google Chrome developers were also fixed with this advisory. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4632, CVE-2009-4633, CVE-2009-4634, CVE-2009-4635, CVE-2009-4636, CVE-2009-4639, CVE-2009-4640, CVE-2010-3429, CVE-2010-3908, CVE-2010-4704, CVE-2011-0480, CVE-2011-0722, CVE-2011-0723
SHA-256 | d6c3a6eef98903a7ea2ba82b2d03e09f18e14c6a66027b06acba91c42c4f166e
Mandriva Linux Security Advisory 2011-060
Posted Apr 1, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-060 - oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain pointer arithmetic, which might allow remote attackers to obtain sensitive memory contents and cause a denial of service via a crafted file that triggers an out-of-bounds read. vorbis_dec.c in FFmpeg 0.5 uses an assignment operator when a comparison operator was intended, which might allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that modifies a loop counter and triggers a heap-based buffer overflow. Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream. FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause utils.c to use inconsistent codec types and identifiers, which causes the mp3 decoder to process a pointer for a video structure, leading to a stack-based buffer overflow. The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows remote attackers to cause a denial of service via a crafted AVI file that triggers a divide-by-zero error. Array index error in vorbis_dec.c in FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Vorbis file that triggers an out-of-bounds read. flicvideo.c in libavcodec 0.6 and earlier in FFmpeg, as used in MPlayer and other products, allows remote attackers to execute arbitrary code via a crafted flic file, related to an arbitrary offset dereference vulnerability. libavcodec/vorbis_dec.c in the Vorbis decoder in FFmpeg 0.6.1 and earlier allows remote attackers to cause a denial of service via a crafted.ogg file, related to the vorbis_floor0_decode function. And several additional vulnerabilities originally discovered by Google Chrome developers were also fixed with this advisory.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4632, CVE-2009-4633, CVE-2009-4634, CVE-2009-4635, CVE-2009-4639, CVE-2009-4640, CVE-2010-3429, CVE-2010-4704
SHA-256 | 72bda34e1a85cce233e9d75d74936eddfb6b008e8d850ac1e6308d2a939ee87b
Mandriva Linux Security Advisory 2011-059
Posted Apr 1, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-059 - Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream. FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause utils.c to use inconsistent codec types and identifiers, which causes the mp3 decoder to process a pointer for a video structure, leading to a stack-based buffer overflow. The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows remote attackers to cause a denial of service via a crafted AVI file that triggers a divide-by-zero error. And several additional vulnerabilities originally discovered by Google Chrome developers were also fixed with this advisory. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4634, CVE-2009-4635, CVE-2009-4639
SHA-256 | 0a8a1f1e04b5536ef974768d7446ef1b4f3284aa9b838d04fa6ef7005a46de35
Page 1 of 4
Back1234Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close