exploit-
intel
Search
Blog
Stats
Labs
Tools
Tools
EIP CLI Search Tool
EIP MCP Server
EIP REST API
API Rate Limits
About
About
About Exploit Intel
About Exploit Forge
Privacy Policy
RSS Feeds
Blog Posts
Recent CVEs
CVEs with Exploits
CISA KEV
Theme
Color Theme
Cyan
Amber
Milw0rm
Light Warm
Paper
Navy
Search
Blog
Statistics
Labs
Tools
EIP CLI Search Tool
EIP MCP Server
EIP REST API
API Rate Limits
About
About Exploit Forge
Privacy
Exploit Database
Researchers
CWE Categories
Vendors
Ecosystems
RSS Feeds
Blog Posts
Recent CVEs
CVEs with Exploits
CISA KEV
Follow:
Theme:
Home
/
Researchers
/
Dvorak
Dvorak
4
exploits
Active since Sep 1999
CVE-2001-0554
EXPLOITDB
c
WORKING POC
MIT Kerberos - Buffer Overflow
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
View Code
CVE-2000-0949
EXPLOITDB
c
WORKING POC
LBNL Traceroute <1.4a5 - Buffer Overflow
Heap overflow in savestr function in LBNL traceroute 1.4a5 and earlier allows a local user to execute arbitrary commands via the -g option.
View Code
CVE-2001-0053
EXPLOITDB
c
WORKING POC
David Madore Ftpd-bsd - Buffer Overflow
One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges.
View Code
CVE-1999-0789
EXPLOITDB
perl
WORKING POC
IBM Aix - Buffer Overflow
Buffer overflow in AIX ftpd in the libc library.
View Code