automatic module_metadata_base.json update
parent
2ec091931a
commit
0606f65d90
|
@ -61853,6 +61853,34 @@
|
|||
"is_install_path": true,
|
||||
"ref_name": "windows/fileformat/blazedvd_plf"
|
||||
},
|
||||
"exploit_windows/fileformat/boxoft_wav_to_mp3": {
|
||||
"name": "Boxoft WAV to MP3 Converter v1.1 Buffer Overflow",
|
||||
"full_name": "exploit/windows/fileformat/boxoft_wav_to_mp3",
|
||||
"rank": 300,
|
||||
"disclosure_date": "2015-08-31",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Robbie Corley",
|
||||
"Shelby Pace"
|
||||
],
|
||||
"description": "This module exploits a stack buffer overflow in Boxoft WAV to MP3 Converter versions 1.0 and 1.1.\n By constructing a specially crafted WAV file and attempting to convert it to an MP3 file in the\n application, a buffer is overwritten, which allows for running shellcode.",
|
||||
"references": [
|
||||
"CVE-2015-7243",
|
||||
"EDB-38035"
|
||||
],
|
||||
"is_server": true,
|
||||
"is_client": false,
|
||||
"platform": "Windows",
|
||||
"arch": "",
|
||||
"rport": "",
|
||||
"targets": [
|
||||
"Boxoft WAV to MP3 Converter v1.1"
|
||||
],
|
||||
"mod_time": "2018-07-02 14:00:33 +0000",
|
||||
"path": "/modules/exploits/windows/fileformat/boxoft_wav_to_mp3.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/fileformat/boxoft_wav_to_mp3"
|
||||
},
|
||||
"exploit_windows/fileformat/bpftp_client_bps_bof": {
|
||||
"name": "BulletProof FTP Client BPS Buffer Overflow",
|
||||
"full_name": "exploit/windows/fileformat/bpftp_client_bps_bof",
|
||||
|
|
Loading…
Reference in New Issue