Silent_Dream

11 exploits Active since Dec 2011
CVE-2011-4835 EXPLOITDB WORKING POC
Homeseer Hs2 - Path Traversal
Directory traversal vulnerability in the web interface in HomeSeer HS2 2.5.0.20 allows remote attackers to access arbitrary files via unspecified vectors.
CVE-2011-10014 EXPLOITDB HIGH ruby WORKING POC
SA-MP <0.3.1.1 - Buffer Overflow
GTA San Andreas Multiplayer (SA-MP) server version 0.3.1.1 is vulnerable to a stack-based buffer overflow triggered by parsing a malformed server.cfg configuration file. The vulnerability allows local attackers to execute arbitrary code when the server binary (samp-server.exe) processes a crafted echo directive containing excessive input. The original 'sa-mp.com' site is defunct, but the community maintains mirrors and forks that may be vulnerable.
CVE-2011-10014 EXPLOITDB HIGH perl WORKING POC
SA-MP <0.3.1.1 - Buffer Overflow
GTA San Andreas Multiplayer (SA-MP) server version 0.3.1.1 is vulnerable to a stack-based buffer overflow triggered by parsing a malformed server.cfg configuration file. The vulnerability allows local attackers to execute arbitrary code when the server binary (samp-server.exe) processes a crafted echo directive containing excessive input. The original 'sa-mp.com' site is defunct, but the community maintains mirrors and forks that may be vulnerable.
CVE-2011-10027 METASPLOIT HIGH ruby WORKING POC
AOL Desktop 9.6 - Buffer Overflow
AOL Desktop 9.6 contains a buffer overflow vulnerability in its Tool\rich.rct component when parsing .rtx files. By embedding an overly long string in a hyperlink tag, an attacker can trigger a stack-based buffer overflow due to the use of unsafe strcpy operations. This allows remote attackers to execute arbitrary code when a victim opens a malicious .rtx file. AOL Desktop is end-of-life and no longer supported. Users are encouraged to migrate to AOL Desktop Gold or alternative platforms.
CVE-2011-10014 METASPLOIT HIGH ruby WORKING POC
SA-MP <0.3.1.1 - Buffer Overflow
GTA San Andreas Multiplayer (SA-MP) server version 0.3.1.1 is vulnerable to a stack-based buffer overflow triggered by parsing a malformed server.cfg configuration file. The vulnerability allows local attackers to execute arbitrary code when the server binary (samp-server.exe) processes a crafted echo directive containing excessive input. The original 'sa-mp.com' site is defunct, but the community maintains mirrors and forks that may be vulnerable.
EIP-2026-119451 EXPLOITDB text WORKING POC
WebcamXP and webcam 7 - Directory Traversal
CVE-2011-4837 EXPLOITDB text WORKING POC
Homeseer Hs2 - CSRF
Cross-site request forgery (CSRF) vulnerability in /ctrl in the web interface in HomeSeer HS2 2.5.0.20 allows remote attackers to hijack the authentication of admins for requests that execute arbitrary programs.
EIP-2026-116039 EXPLOITDB perl STUB
Passport PC To Host - '.zws' File Memory Corruption
EIP-2026-115000 EXPLOITDB perl WORKING POC
BlueZone Desktop - '.zap' file Local Denial of Service
CVE-2011-5173 EXPLOITDB perl WORKING POC
Bugbear Flatout - Memory Corruption
Buffer overflow in Bugbear Entertainment FlatOut 2005 allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the title field in a bed file.
EIP-2026-115001 EXPLOITDB perl WORKING POC
BlueZone Desktop - Multiple Malformed Files Local Denial of Service Vulnerabilities