the itch

9 exploits Active since Feb 2001
EIP-2026-114790 EXPLOITDB c WORKING POC
Mini SQL 1.0/1.3 - Remote Format String
CVE-2001-0459 EXPLOITDB c WORKING POC
Afterstep - Buffer Overflow
Buffer overflows in ascdc Afterstep while running setuid allows local users to gain root privileges via a long (1) -d option, (2) -m option, or (3) -f option.
CVE-2001-1127 EXPLOITDB c WORKING POC
Progress database 8.3D-9.1C - RCE
Buffer overflow in Progress database 8.3D and 9.1C could allow a local user to execute arbitrary code via (1) _proapsv, (2) _mprosrv, (3) _mprshut, (4) orarx, (5) sqlcpp, (6) _probrkr, (7) _sqlschema and (8) _sqldump.
EIP-2026-103809 EXPLOITDB c WORKING POC
Progress Database Server 8.3b - 'prodb' Local Privilege Escalation
EIP-2026-103165 EXPLOITDB c WORKING POC
miniSQL (mSQL) 1.3 - GID Remote Code Execution
CVE-2002-1767 EXPLOITDB c WORKING POC
Oracle Database Server - Buffer Overflow
Buffer overflow in tnslsnr of Oracle 8i Database Server 8.1.5 for Linux allows local users to execute arbitrary code as the oracle user via a long command line argument.
CVE-2002-0468 EXPLOITDB c WORKING POC
Ecartis - Buffer Overflow
Buffer overflows in Ecartis (formerly Listar) 1.0.0 in snapshot 20020427 and earlier allow local users to gain privileges via (1) a long command line argument, which is not properly handled in core.c, or possibly via bad uses of sprintf() in (2) moderate.c, (3) lcgi.c, (4) fileapi.c, (5) cookie.c, (6) codes.c, or other files.
CVE-2002-0468 EXPLOITDB c WORKING POC
Ecartis - Buffer Overflow
Buffer overflows in Ecartis (formerly Listar) 1.0.0 in snapshot 20020427 and earlier allow local users to gain privileges via (1) a long command line argument, which is not properly handled in core.c, or possibly via bad uses of sprintf() in (2) moderate.c, (3) lcgi.c, (4) fileapi.c, (5) cookie.c, (6) codes.c, or other files.
CVE-2001-0040 EXPLOITDB c WORKING POC
APC UPS daemon - Local Privilege Escalation
APC UPS daemon, apcupsd, saves its process ID in a world-writable file, which allows local users to kill an arbitrary process by specifying the target process ID in the apcupsd.pid file.