stripey

8 exploits Active since Sep 2002
CVE-2002-2087 EXPLOITDB perl WORKING POC
Borland Software Interbase - Buffer Overflow
Buffer overflow in Borland InterBase 6.0 allows local users to execute arbitrary code via a long INTERBASE environment variable when calling (1) gds_drop, (2) gds_lock_mgr, or (3) gds_inet_server.
EIP-2026-114745 EXPLOITDB perl WORKING POC
Tru64 UNIX 5.0 (Rev. 910) - rdist NLSPATH Buffer Overflow
EIP-2026-114768 EXPLOITDB perl WORKING POC
HP Tru64 - NLSPATH Environment Variable Local Buffer Overflow (1)
EIP-2026-114769 EXPLOITDB perl WORKING POC
HP Tru64 - NLSPATH Environment Variable Local Buffer Overflow (2)
EIP-2026-114744 EXPLOITDB perl WORKING POC
Tru64 UNIX 5.0 (Rev. 910) - edauth NLSPATH Buffer Overflow
CVE-2002-1129 EXPLOITDB perl WORKING POC
dxterm - Buffer Overflow
Buffer overflow in dxterm allows local users to execute arbitrary code via a long -xrm argument.
CVE-2003-0281 EXPLOITDB perl WORKING POC
Firebird <1.5 - Buffer Overflow
Buffer overflow in Firebird 1.0.2 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows local users to execute arbitrary code via a long INTERBASE environment variable when calling (1) gds_inet_server, (2) gds_lock_mgr, or (3) gds_drop.
CVE-2002-1605 EXPLOITDB perl WORKING POC
HP Tru64 UNIX <5.1a-4.0f - Buffer Overflow
Buffer overflow in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows attackers to execute arbitrary code via a long _XKB_CHARSET environment variable to (1) dxpause, (2) dxconsole, or (3) dtsession.