Andres Gomez

3 exploits Active since Dec 2011
CVE-2011-4620 EXPLOITDB c WORKING POC
Steve J Baker Plib - Memory Corruption
Buffer overflow in the ulSetError function in util/ulError.cxx in PLIB 1.8.5, as used in TORCS 1.3.1 and other products, allows user-assisted remote attackers to execute arbitrary code via vectors involving a long error message, as demonstrated by a crafted acc file for TORCS. NOTE: some of these details are obtained from third party information.
CVE-2012-1189 EXPLOITDB c WORKING POC
Bernhard Wymann Torcs < 1.3.2 - Memory Corruption
Stack-based buffer overflow in modules/graphic/ssgraph/grsound.cpp in The Open Racing Car Simulator (TORCS) before 1.3.3 and Speed Dreams allows user-assisted remote attackers to execute arbitrary code via a long file name in an engine sample attribute in an xml configuration file.
CVE-2012-4552 EXPLOITDB c WORKING POC
PLIB 1.8.5 - Buffer Overflow
Stack-based buffer overflow in the error function in ssg/ssgParser.cxx in PLIB 1.8.5 allows remote attackers to execute arbitrary code via a crafted 3d model file that triggers a long error message, as demonstrated by a .ase file.