header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MJM Core Player 2011 .s3m Stack Buffer Overflow

This module exploits a stack buffer overflow in MJM Core Player 2011. When opening a malicious s3m file in this applications, a stack buffer overflow can be triggered, resulting in arbitrary code execution. This exploit bypasses DEP & ASLR, and works on XP, Vista & Windows 7.

MJM QuickPlayer 1.00 beta 60a / QuickPlayer 2010 .s3m Stack Buffer Overflow

This module exploits a stack buffer overflow in MJM QuickPlayer 1.00 beta 60a and QuickPlayer 2010 (Multi-target exploit). When opening a malicious s3m file in one of these 2 applications, a stack buffer overflow can be triggered, resulting in arbitrary code execution. This exploit bypasses DEP & ASLR, and works on XP, Vista & Windows 7.

Microsoft Office Excel Axis Properties Record Parsing Buffer Overflow

This is a PoC for MS11-021/CVE-2011-0978. It modifies bits at file location 0x39E7 and eax points to location in the file 0xFB4. The data at this location is 00630009 0061006c 00730065 006d0065 006e0074 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c 006f0063 0061006c.

Subtitle Processor 7.7.1 .M3U SEH Unicode Buffer Overflow

This module exploits a vulnerability found in Subtitle Processor 7. By supplying a long string of data as a .m3u file, Subtitle Processor first converts this input in Unicode, which expands the string size, and then attempts to copy it inline on the stack. This results a buffer overflow with SEH overwritten, allowing arbitrary code execution.

KusabaX XSS and CSRF Vulnerabilites

File 'animation.php' suffer from XSS vulnerabilities in line 47, which allows attackers to execute arbitrary HTML and script code in a user's browser session that visit resulting in a cookie stealing and bypass of admin access controls. The vulnerability in 'manage_page.php' script permits to execute SQL commands through 'SQL query' section of Administrator Panel.

eyeOS <= 1.9.0.2 Stored XSS vulnerability using image files

A stored XSS vulnerability using image files (jpg, png, gif tested) affects to eyeOS 1.9.0.2 version, older versions are probably affected too. eyeOS 2.x branch doesn't seem to be affected. When the user opens an image file in eyeOS, a new html frame is opened with the image file. It's ok, the problem is that we can upload files that aren't images with an image extension, and it will be opened in a frame too. That means that we can upload a HTML file (with JS inside, why not?) and it will be opened in a new frame when an user click on it. Malicious users can inject code inside image files (malware, browser exploits, etc...) to attack other users and compromise the whole system via shared files or internal messages.

Snom IP Phone Web Interface Multiple Vulnerabilities

The vulnerabilities allows an unprivileged attacker to read the sip details including password & write javascript code. The vulnerablities are in: XSS - Address Book: http://127.0.0.1/adr.htm & DATA DISCLOSURE - Password disclosure: http://127.0.0.1/line_login.htm?l=1. XSS Vulnerability: The xss vulnerability found in the section 'Addres Book' of 'Snom IP Phone' software. The vulnerability allows the attacker to inject javascript code to the field 'number'. To exploit the vulnerability we need to access to the 'Snom IP Phone' by this url 'http://address/adr.htm'. Then we can write any javascript code that we want and send the form. by the next refreshing of the page the javascript code will run. If we already inject the javascript code so we can also be exploited by the next page 'http://address/tbook.csv'. DATA DISCLOSURE: The data disclosure vulnerability found in the section of 'Line 1' of 'Snom IP Phone' software. The vulnerability allow the attacker to read the sip details including password. To exploit the vulnerability we need to access to the 'Snom IP Phone' by this url 'http://address/line_login.htm?l=1'. Then we can see the sip details including password.

Recent Exploits: