C4SS!0 G0M3S

47 exploits Active since Jul 2009
CVE-2011-10016 EXPLOITDB CRITICAL ruby WORKING POC
Real Networks Netzip Classic 7.5.1.86 - Buffer Overflow
Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened.
CVE-2011-10016 EXPLOITDB CRITICAL ruby WORKING POC
Real Networks Netzip Classic 7.5.1.86 - Buffer Overflow
Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened.
CVE-2010-10016 EXPLOITDB CRITICAL ruby WORKING POC
BS.Player 2.57 - Buffer Overflow
BS.Player version 2.57 (build 1051) contains a vulnerability in its playlist import functionality. When processing .m3u files, the application fails to properly validate the length of playlist entries, resulting in a buffer overflow condition. This flaw occurs during parsing of long URLs embedded in the playlist, allowing overwrite of Structured Exception Handler (SEH) records. The vulnerability is triggered upon opening a crafted playlist file and affects the Unicode parsing logic in the Windows client.
CVE-2010-10016 EXPLOITDB CRITICAL python WORKING POC
BS.Player 2.57 - Buffer Overflow
BS.Player version 2.57 (build 1051) contains a vulnerability in its playlist import functionality. When processing .m3u files, the application fails to properly validate the length of playlist entries, resulting in a buffer overflow condition. This flaw occurs during parsing of long URLs embedded in the playlist, allowing overwrite of Structured Exception Handler (SEH) records. The vulnerability is triggered upon opening a crafted playlist file and affects the Unicode parsing logic in the Windows client.
CVE-2011-10029 METASPLOIT HIGH ruby WORKING POC
Solar FTP Server - DoS
Solar FTP Server fails to properly handle format strings passed to the USER command. When a specially crafted string containing format specifiers is sent, the server crashes due to a read access violation in the __output_1() function of sfsservice.exe. This results in a denial of service (DoS) condition.
CVE-2010-10016 METASPLOIT CRITICAL ruby WORKING POC
BS.Player 2.57 - Buffer Overflow
BS.Player version 2.57 (build 1051) contains a vulnerability in its playlist import functionality. When processing .m3u files, the application fails to properly validate the length of playlist entries, resulting in a buffer overflow condition. This flaw occurs during parsing of long URLs embedded in the playlist, allowing overwrite of Structured Exception Handler (SEH) records. The vulnerability is triggered upon opening a crafted playlist file and affects the Unicode parsing logic in the Windows client.
CVE-2011-10016 METASPLOIT CRITICAL ruby WORKING POC
Real Networks Netzip Classic 7.5.1.86 - Buffer Overflow
Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened.
EIP-2026-118986 EXPLOITDB perl WORKING POC
OpenMyZip 0.1 - '.zip' Remote Buffer Overflow
EIP-2026-118560 EXPLOITDB ruby WORKING POC
Freefloat FTP Server - 'MKD' Remote Buffer Overflow (Metasploit)
EIP-2026-118575 EXPLOITDB python WORKING POC
Freefloat FTP Server 1.0 - 'REST' / 'PASV' Remote Buffer Overflow
EIP-2026-118572 EXPLOITDB ruby WORKING POC
Freefloat FTP Server 1.0 - 'MKD' Remote Buffer Overflow
EIP-2026-118561 EXPLOITDB ruby WORKING POC
Freefloat FTP Server - 'REST' Remote Buffer Overflow (Metasploit)
EIP-2026-118521 EXPLOITDB perl WORKING POC
ESTsoft ALZip 8.12.0.3 - '.zip' Remote Buffer Overflow
EIP-2026-118164 EXPLOITDB python WORKING POC
Wordtrainer 3.0 - '.ord' Local Buffer Overflow
EIP-2026-118205 EXPLOITDB perl WORKING POC
ZipX 1.71 - '.ZIP' File Buffer Overflow
EIP-2026-118201 EXPLOITDB perl WORKING POC
ZipGenius 6.3.2.3000 - '.zip' Local Buffer Overflow
EIP-2026-118165 EXPLOITDB ruby WORKING POC
Wordtrainer 3.0 - '.ord' Local Buffer Overflow (Metasploit)
EIP-2026-117910 EXPLOITDB perl WORKING POC
SimplyPlay 66 - '.pls' Local Buffer Overflow
EIP-2026-117775 EXPLOITDB python WORKING POC
PlaylistMaker 1.5 - '.txt' Local Buffer Overflow
EIP-2026-117434 EXPLOITDB perl WORKING POC
Magic Music Editor - Local Buffer Overflow
EIP-2026-117591 EXPLOITDB perl WORKING POC
MikeyZip 1.1 - '.zip' Local Buffer Overflow
EIP-2026-117636 EXPLOITDB python WORKING POC
MP3 CD Converter Professional - Local Buffer Overflow (SEH)
EIP-2026-117637 EXPLOITDB python WORKING POC
MP3 CD Converter Professional 5.3.0 - Universal DEP Bypass
CVE-2009-2364 EXPLOITDB python WORKING POC
Mp3-Nator 2.0 - Buffer Overflow
Stack-based buffer overflow in Mp3-Nator 2.0 allows remote attackers to execute arbitrary code via (1) a long string in a .plf file and (2) a long string in the listdata.dat file, possibly related to a track entry.
EIP-2026-117656 EXPLOITDB perl WORKING POC
Muse Music All-in-One 1.5.0.001 - '.pls' Local Buffer Overflow (DEP Bypass)