This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.
6aadc69d3bc6b1f7513f995d00471a16d1534088f0b0cfb9a3bbad503d044aa7
XMPlay version 3.3.0.4 .M3U filename local buffer overflow exploit that executes CALC.exe.
082bb5e1b00a07a7d2af2a365a3da3b5aa70c31d6de463b58cf200a19606e19f
Novell eDirectory versions 9.0 and below DHost remote buffer overflow exploit.
1acfa7a13ca13f316e5a4c8f1d11e2f197cda1019616c5dc3401e0d70f57d958
Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.
a01cbeda0ca3af143a437e3f105f122b5ca65dd6fed028ccf124d6b599630770
FreeFTPd remote USER buffer overflow exploit for versions 1.0.8 and below.
8da2a5f3da96fa0cafbeead497312b5e06fcdbd17ce4badd50add24f1c732a7c
Exploit for a remote denial of service flaw for HTTP GET in Hasbani-WindWeb version 2.0.
e7ea5226541a9e30177def6562f8d6efcb06aad03e47001f1f145555549dc8b9
MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.
3c903a1c75d2c6ce2dc58166691a78cc53abf54674742b75c0de08bc36644648
MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.
2edd1ae02970c2a37df0d63b2f434b3f3acccbe4d46c6f12b8f968b4377f3bc5