s-dz

12 exploits Active since Aug 2025
CVE-2010-20042 EXPLOITDB HIGH perl WORKING POC
Xion Audio Player <1.0.126 - Buffer Overflow
Xion Audio Player versions prior to 1.0.126 are vulnerable to a Unicode-based stack buffer overflow triggered by opening a specially crafted .m3u playlist file. The file contains an overly long string that overwrites the Structured Exception Handler (SEH) chain, allowing an attacker to hijack execution flow and run arbitrary code.
EIP-2026-118400 EXPLOITDB html WORKING POC
dBpowerAMP Audio Player 2 - 'FileExists' ActiveX Buffer Overflow
EIP-2026-118143 EXPLOITDB perl WORKING POC
WM Downloader 3.1.2.2 - Local Buffer Overflow (1)
EIP-2026-117460 EXPLOITDB perl WORKING POC
Mediacoder 0.7.3.4682 - '.m3u' Universal Buffer Overflow
EIP-2026-116493 EXPLOITDB python WORKING POC
VideoLAN VLC Media Player < 1.1.4 - '.xspf smb://' URI Handling Remote Stack Overflow (PoC)
EIP-2026-116618 EXPLOITDB perl WORKING POC
Xmyplay 3.5.1 - Denial of Service
EIP-2026-116120 EXPLOITDB python WORKING POC
QQPlayer 2.3.696.400p1 - '.wav' Denial of Service
EIP-2026-115474 EXPLOITDB perl WORKING POC
Jaangle 0.98e.971 - Denial of Service
EIP-2026-115604 EXPLOITDB python WORKING POC
Mediacoder 0.8.33 build 5680 - '.m3u' Buffer Overflow (PoC) (SEH Overwrite)
EIP-2026-115603 EXPLOITDB python WORKING POC
Mediacoder 0.8.33 build 5680 - '.lst' Buffer Overflow (PoC) (SEH Overwrite)
EIP-2026-115475 EXPLOITDB python WORKING POC
jaangle 0.98i.977 - Denial of Service
EIP-2026-114907 EXPLOITDB html WORKING POC
AoAAudioExtractor 2.0.0.0 - ActiveX (PoC) (SEH)