Dz_attacker

10 exploits Active since Feb 2010
CVE-2009-20004 EXPLOITDB HIGH python WORKING POC
gAlan 0.2.1 - Buffer Overflow
gAlan 0.2.1, a modular audio processing environment for Windows, is vulnerable to a stack-based buffer overflow when parsing .galan files. The application fails to properly validate the length of input data, allowing a specially crafted file to overwrite the stack and execute arbitrary code. Exploitation requires local interaction, typically by convincing a user to open the malicious file.
CVE-2010-20115 EXPLOITDB CRITICAL python WORKING POC
Vermillion FTP Daemon <1.31 - Memory Corruption
Arcane Software’s Vermillion FTP Daemon (vftpd) versions up to and including 1.31 contains a memory corruption vulnerability triggered by a malformed FTP PORT command. The flaw arises from an out-of-bounds array access during input parsing, allowing an attacker to manipulate stack memory and potentially execute arbitrary code. Exploitation requires direct access to the FTP service and is constrained by a single execution attempt if the daemon is installed as a Windows service.
CVE-2010-10015 EXPLOITDB HIGH html WORKING POC
AOL <9.5 - Buffer Overflow
AOL versions up to and including 9.5 includes an ActiveX control (Phobos.dll) that exposes a method called Import() via the Phobos.Playlist COM object. This method is vulnerable to a stack-based buffer overflow when provided with an excessively long string argument. Exploitation allows remote attackers to execute arbitrary code in the context of the user, but only when the malicious HTML file is opened locally, due to the control not being marked safe for scripting or initialization. AOL remains an active and supported brand offering services like AOL Mail and AOL Desktop Gold, but the legacy AOL 9.5 desktop software—specifically the version containing the vulnerable Phobos.dll ActiveX control—is long discontinued and no longer maintained.
CVE-2010-0679 METASPLOIT ruby WORKING POC
Hyleos Chemview - Memory Corruption
Multiple stack-based buffer overflows in the HyleosChemView.HLChemView ActiveX control (HyleosChemView.ocx) in Hyleos ChemView 1.9.5.1 allow remote attackers to execute arbitrary code via a large number of white space characters in the filename argument to the (1) SaveasMolFile and (2) ReadMolFile methods.
CVE-2010-0679 EXPLOITDB ruby WORKING POC
Hyleos Chemview - Memory Corruption
Multiple stack-based buffer overflows in the HyleosChemView.HLChemView ActiveX control (HyleosChemView.ocx) in Hyleos ChemView 1.9.5.1 allow remote attackers to execute arbitrary code via a large number of white space characters in the filename argument to the (1) SaveasMolFile and (2) ReadMolFile methods.
CVE-2010-0679 EXPLOITDB ruby WORKING POC
Hyleos Chemview - Memory Corruption
Multiple stack-based buffer overflows in the HyleosChemView.HLChemView ActiveX control (HyleosChemView.ocx) in Hyleos ChemView 1.9.5.1 allow remote attackers to execute arbitrary code via a large number of white space characters in the filename argument to the (1) SaveasMolFile and (2) ReadMolFile methods.
EIP-2026-118110 EXPLOITDB perl WORKING POC
Winamp 5.572 - 'whatsnew.txt' Local Stack Overflow
EIP-2026-117827 EXPLOITDB python WORKING POC
RadASM 2.2.1.6 - '.rap' Universal Buffer Overflow
CVE-2010-2004 EXPLOITDB python WORKING POC
Bsplayer Bs.player - Memory Corruption
Stack-based buffer overflow in BS.Global BS.Player 2.51 Build 1022 Free, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via the Skin parameter in the Options section of a skins file (.bsi), a different vulnerability than CVE-2009-1068.
EIP-2026-117290 EXPLOITDB python WORKING POC
HTML Help Workshop 4.74 - hhp Universal Buffer Overflow