Jean-Sebastien Guay-Leroux

2 exploits Active since Sep 2006
CVE-2007-1536 EXPLOITDB c WORKING POC
File < 4.19 - Numeric Error
Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
CVE-2006-4438 EXPLOITDB c WORKING POC
Doctor WEB LTD Dr.web < 4.33_for_linux - Buffer Overflow
Heap-based buffer overflow in SpIDer for Dr.Web Scanner for Linux 4.33, and possibly earlier versions, allows remote attackers to execute arbitrary code via an LHA archive with an extended header that contains a long directory name.