CVE-2009-2364 – MP3-Nator 2.0 - '.plf' Universal Buffer Overflow (SEH)
https://notcve.org/view.php?id=CVE-2009-2364
Stack-based buffer overflow in Mp3-Nator 2.0 allows remote attackers to execute arbitrary code via (1) a long string in a .plf file and (2) a long string in the listdata.dat file, possibly related to a track entry. Desbordamiento de búfer basado en pila en Mp3-Nator v2.0 permite a los atacantes remotos ejecutar código a su elección a través de cadenas largas en archivos .plf, probablemente relacionados con una entrada. • https://www.exploit-db.com/exploits/9060 https://www.exploit-db.com/exploits/15569 https://www.exploit-db.com/exploits/15489 http://www.exploit-db.com/exploits/9060 http://www.exploit-db.com/exploits/9136 http://www.vupen.com/english/advisories/2009/1765 https://exchange.xforce.ibmcloud.com/vulnerabilities/51486 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-6139 – Mp3 ToolBox 1.0 Beta 5 - 'skin_file' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-6139
PHP remote file inclusion vulnerability in index.php in Mp3 ToolBox 1.0 beta 5 allows remote attackers to execute arbitrary PHP code via a URL in the skin_file parameter. Vulnerabilidad de inclusión remota de archivo en PHP en index.php de Mp3 ToolBox 1.0 beta 5 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro skin_file. • https://www.exploit-db.com/exploits/4650 http://www.securityfocus.com/archive/1/484121/100/0/threaded http://www.vupen.com/english/advisories/2007/3997 https://exchange.xforce.ibmcloud.com/vulnerabilities/38598 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-0018 – Microsoft Internet Explorer - NCTAudioFile2.AudioFile ActiveX Remote Overflow
https://notcve.org/view.php?id=CVE-2007-0018
Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media, and others; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, and others; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter, and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordNRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, and others; (28) MP3 WAV Converter; (29) BearShare 6.0.2.26789; and (30) Oracle Siebel SimBuilder and CRM 7.x. Un desbordamiento de búfer en la región stack de la memoria en el control ActiveX NCTAudioFile2.AudioFile (NCTAudioFile2.dll), tal y como es usado en varios productos, permite a atacantes remotos ejecutar código arbitrario por medio de un argumento largo a la función SetFormatLikeSample. NOTA: los productos incluyen (1) NCTsoft NCTAudioStudio, NCTAudioEditor and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. • https://www.exploit-db.com/exploits/3728 https://www.exploit-db.com/exploits/3808 https://www.exploit-db.com/exploits/16603 http://secunia.com/advisories/22922 http://secunia.com/advisories/23475 http://secunia.com/advisories/23485 http://secunia.com/advisories/23493 http://secunia.com/advisories/23495 http://secunia.com/advisories/23511 http://secunia.com/advisories/23516 http://secunia.com/advisories/23530 http://secunia.com/advisories/23532 http://secunia.com/ad • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-5613 – mp3SDS 3.0 - '/Core/core.inc.php' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-5613
PHP remote file inclusion in Core/core.inc.php in MP3 Streaming DownSampler (mp3SDS) 3.0, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the fullpath parameter Inclusión remota de archivo PHP en Core/core.inc.php en MP3 Streaming DownSampler (mp3SDS) 3.0, cuando está habilitado register_globals, permite a atacantes remotos ejecutar código PHP arbitrario a través del parámetro fullpath. • https://www.exploit-db.com/exploits/2666 http://secunia.com/advisories/22605 http://www.osvdb.org/30110 http://www.securityfocus.com/bid/20783 http://www.vupen.com/english/advisories/2006/4230 https://exchange.xforce.ibmcloud.com/vulnerabilities/29888 •