Matteo Memelli aka ryujin

9 exploits Active since Dec 2007
CVE-2007-6681 EXPLOITDB python WORKING POC
VLC 0.8.6d - Buffer Overflow
Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file.
CVE-2007-3901 EXPLOITDB python WORKING POC
Microsoft Directx - Memory Corruption
Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
CVE-2008-2573 EXPLOITDB perl WORKING POC
Freesshd - Memory Corruption
Stack-based buffer overflow in SFTP in freeSSHd 1.2.1 allows remote authenticated users to execute arbitrary code via a long directory name in an SSH_FXP_OPENDIR (aka opendir) command.
CVE-2008-1881 EXPLOITDB python WORKING POC
VLC 0.8.6e - Buffer Overflow
Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file. NOTE: this issue is due to an incomplete fix for CVE-2007-6681.
EIP-2026-117770 EXPLOITDB php WORKING POC
PHP 6.0 Dev - 'str_transliterate()' Local Buffer Overflow (NX + ASLR Bypass)
CVE-2010-0705 EXPLOITDB python WORKING POC
avast! 4.8-5.0.418.0 - Local Privilege Escalation
Aavmker4.sys in avast! 4.8 through 4.8.1368.0 and 5.0 before 5.0.418.0 running on Windows 2000 and XP does not properly validate input to IOCTL 0xb2d60030, which allows local users to cause a denial of service (system crash) or execute arbitrary code to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption.
EIP-2026-116565 EXPLOITDB python WORKING POC
WinWebMail 3.7.3 - IMAP Login Data Handling Denial of Service
CVE-2008-1854 EXPLOITDB python WORKING POC
SmarterMail <5.0.2999 - DoS
Unspecified vulnerability in SmarterMail Web Server (SMWebSvr.exe) in SmarterMail 5.0.2999 allows remote attackers to cause a denial of service (service termination) via a long HTTP (1) GET, (2) HEAD, (3) PUT, (4) POST, or (5) TRACE request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVE-2008-1275 EXPLOITDB python WORKING POC
MailEnable <3.x - DoS
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.