header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

RM Downloader Version 3.0.0.9 .m3u Universal Stack Overflow Exploit

This exploit is for RM Downloader Version 3.0.0.9 .m3u Universal Stack Overflow. It is discovered by Cyber-Zone and exploited by Stack. The exploit is based on a buffer overflow vulnerability which allows an attacker to execute arbitrary code on the vulnerable system. The exploit code contains a header, shellcode, an exception handler address and a NOP sled.

ASX to MP3 Converter (.M3U File) Local Stack Overflow POC

A stack-based buffer overflow vulnerability exists in ASX to MP3 Converter. The vulnerability is caused due to a boundary error when handling .M3U files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.

Mini-stream RM-MP3 Converter (.M3U File) Local Stack Overflow POC

A stack-based buffer overflow vulnerability exists in Mini-stream RM-MP3 Converter. The vulnerability is caused due to a boundary error when handling specially crafted .M3U files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.

RM Downloader (.M3U File) Local Stack Overflow POC

A stack overflow vulnerability exists in RM Downloader, which is triggered when a specially crafted .M3U file is opened. This can result in arbitrary code execution. This vulnerability is being exploited in the wild, and a proof-of-concept is publicly available.

WM Downloader (.M3U File) Local Stack Overflow POC

A stack overflow vulnerability exists in WM Downloader, which is caused by an overly long string being passed to the application when processing .M3U files. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.

Mini-stream Ripper (.M3U File) Local Stack Overflow POC

A stack-based buffer overflow vulnerability exists in Mini-stream Ripper, a program used to convert RealMedia files to MP3. The vulnerability is caused due to a boundary error when handling .M3U files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.

Flatnuke <= 2.7.1 (level) Privilege Escalation 0-day Exploit

Flatnuke contains one flaw that may allow a user to become administrator. The issue is due to 'sections/none_Login/section.php' script not properly sanitizing user input supplied to the 'level' POST variable. GPC = Off Change your rights using the null byte.

Recent Exploits: