Shinnok

8 exploits Active since Jun 2008
CVE-2008-2427 EXPLOITDB c WORKING POC
Pagesperso-orange Gfl SDK - Memory Corruption
Stack-based buffer overflow in NConvert 4.92, GFL SDK 2.82, and XnView 1.93.6 on Windows and 1.70 on Linux and FreeBSD allows user-assisted remote attackers to execute arbitrary code via a crafted format keyword in a Sun TAAC file.
CVE-2008-3182 EXPLOITDB c WORKING POC
Download Accelerator Plus <8.6.6.3 - Buffer Overflow
Stack-based buffer overflow in DAP.exe in Download Accelerator Plus (DAP) 7.0.1.3, 8.6.6.3, and other 8.x versions allows user-assisted remote attackers to execute arbitrary code via an M3U (.m3u) file containing a long MP3 URL.
CVE-2008-4136 EXPLOITDB c WORKING POC
Michael Roth Software Pftp - Improper Input Validation
Michael Roth Software Personal FTP Server (PFT) 6.0f allows remote attackers to cause a denial of service (service crash) via multiple RETR commands, possibly involving long filenames.
CVE-2008-3269 EXPLOITDB c WORKING POC
WinSoftMagic WRPC <2008 - DoS
WRPCServer.exe in WinSoftMagic WinRemotePC (WRPC) Lite 2008 and Full 2008 allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet to TCP port 4321.
CVE-2008-6998 EXPLOITDB html WORKING POC
Google Chrome - Memory Corruption
Stack-based buffer overflow in chrome/common/gfx/url_elider.cc in Google Chrome 0.2.149.27 and other versions before 0.2.149.29 might allow user-assisted remote attackers to execute arbitrary code via a link target (href attribute) with a large number of path elements, which triggers the overflow when the status bar is updated after the user hovers over the link.
EIP-2026-115607 EXPLOITDB python WORKING POC
MediaMonkey 3.0.3 - URI Handling Multiple Denial of Service Vulnerabilities
EIP-2026-114988 EXPLOITDB python WORKING POC
BitComet 1.02 - URI Handling Remote Denial of Service
CVE-2008-4682 EXPLOITDB text WORKING POC
Wireshark - Improper Input Validation
wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application abort) via a malformed Tamos CommView capture file (aka .ncf file) with an "unknown/unexpected packet type" that triggers a failed assertion.