We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A buffer overflow vulnerability exists in the X360 VideoPlayer ActiveX control (VideoPlayer.ocx) version 2.6 when handling overly long arguments to the ConvertFile() method. An attacker can exploit this vulnerability by supplying crafted input to cause memory corruption and execute arbitrary code within the context of the current process.
Reserved 2025-04-15 | Published 2025-07-16 | Updated 2025-07-16 | Assigner VulnCheckCWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-94 Improper Control of Generation of Code ('Code Injection')
Rh0
raw.githubusercontent.com/...60_video_player_set_text_bof.rb
rh0dev.github.io/blog/2015/fun-with-info-leaks/
www.exploit-db.com/exploits/35948
www.fortiguard.com/...player-activex-control-buffer-overflow
www.vulncheck.com/...oplayer-activex-control-buffer-overflow
www.exploit-db.com/exploits/36100
Support options