This exploit is for RM Downloader Version 3.0.0.9 .m3u Universal Stack Overflow. It is discovered by Cyber-Zone and exploited by Stack. The exploit is based on a buffer overflow vulnerability which allows an attacker to execute arbitrary code on the vulnerable system. The exploit code contains a header, shellcode, an exception handler address and a NOP sled.
If the user is not an administrator, the code redirects it to main.php. This can be exploited by disabling redirection using lynx and accessing the admin/admin.php page.
A stack-based buffer overflow vulnerability exists in ASX to MP3 Converter. The vulnerability is caused due to a boundary error when handling .M3U files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.
OpenBSDs PF firewall in OpenBSD 4.3 up to OpenBSD-current is prone to a remote Denial of Service during a null pointer dereference in relation with special crafted IP datagrams. If the firewall handles such a packet the kernel panics.
A stack-based buffer overflow vulnerability exists in Mini-stream RM-MP3 Converter. The vulnerability is caused due to a boundary error when handling specially crafted .M3U files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.
A stack overflow vulnerability exists in RM Downloader, which is triggered when a specially crafted .M3U file is opened. This can result in arbitrary code execution. This vulnerability is being exploited in the wild, and a proof-of-concept is publicly available.
A stack overflow vulnerability exists in WM Downloader, which is caused by an overly long string being passed to the application when processing .M3U files. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.
A stack-based buffer overflow vulnerability exists in Mini-stream Ripper, a program used to convert RealMedia files to MP3. The vulnerability is caused due to a boundary error when handling .M3U files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.
This exploit is for HTML Email Creator <= 2.1 build 668. It is a Local SEH Overwrite Exploit which is triggered by using a malicious <img> tag. The exploit code contains a NOP sled followed by a short jump (jmp 11) and a pop-pop-ret address. The exploit code also contains a shellcode which is used to execute a calculator program. The exploit has been tested on Windows XP SP2 with installed PC TOOLS Spyware Doctor and Windows XP without any upgrades.
Flatnuke contains one flaw that may allow a user to become administrator. The issue is due to 'sections/none_Login/section.php' script not properly sanitizing user input supplied to the 'level' POST variable. GPC = Off Change your rights using the null byte.