9.3
CVSSv2

CVE-2009-0546

Published: 12/02/2009 Updated: 10/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 950
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in NewsGator FeedDemon 2.7 and previous versions allows user-assisted remote malicious users to execute arbitrary code via a long text attribute in an outline element in a .opml file.

Vulnerable Product Search on Vulmon Subscribe to Product

newsgator feeddemon 2.0.0.24

newsgator feeddemon 2.6.1.4

newsgator feeddemon 2.6.1.5

newsgator feeddemon

newsgator feeddemon 2.6

Exploits

## # $Id: feeddemon_opmlrb 10998 2010-11-11 22:43:22Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...
#!usr/bin/perl -w ################################################################################ # Reference: # securitybkisvn/?p=329 # wwwsecurityfocuscom/bid/33630/info # # Tested on Windows Server 2003 with FeedMon 2700 FeedMon crashes # whenever I am trying to Unsubscribe from the malicious(overl ...
#!/usr/local/bin/perl #----------------------------------------------------------------------------- # FeedDemon version 2700 Buffer overFlow # Reference: # securitybkisvn/?p=329 # wwwsecurityfocuscom/bid/33630/info # secuniacom/advisories/33718/ # Tested in Windows XP Sp2 (English) # Created by cenjan (xcenjanx@yahooc ...
/*Download latest vuln app :wwwnewsgatorcom/Individuals/FeedDemon/Defaultaspx This exploit identifies your OS and searches in memory for a RETCODE thus working 100%*/ #include<stdioh> #include<stringh> #include<getopth> #include<windowsh> void banner(); void exploit(char*); void print(char*); unsigned int ...