Exploitdb Exploits

3,149 exploits tracked across all sources.

Sort: Activity Stars
CVE-2001-0830 EXPLOITDB HIGH c VERIFIED
6tunnel < 0.08 - Resource Leak
6tunnel 0.08 and earlier does not properly close sockets that were initiated by a client, which allows remote attackers to cause a denial of service (resource exhaustion) by repeatedly connecting to and disconnecting from the server.
by awayzzz
CVSS 7.5
CVE-2001-1015 EXPLOITDB c VERIFIED
Snes9x - Buffer Overflow
Buffer overflow in Snes9x 1.37, when installed setuid root, allows local users to gain root privileges via a long command line argument.
by Niels Heinen
CVE-2001-0740 EXPLOITDB c VERIFIED
3com 3c840-us < 1.1.9 - Denial of Service
3COM OfficeConnect 812 and 840 ADSL Router 4.2, running OCR812 router software 1.1.9 and earlier, allows remote attackers to cause a denial of service via a long string containing a large number of "%s" strings, possibly triggering a format string vulnerability.
by Sniffer
CVE-2001-1112 EXPLOITDB c VERIFIED
EFTP 2.0.7.337 - RCE
Buffer overflow in EFTP 2.0.7.337 allows remote attackers to execute arbitrary code by uploading a .lnk file containing a large number of characters.
by byterage
CVE-2002-1652 EXPLOITDB c VERIFIED
MIT Cgiemail - Buffer Overflow
Buffer overflow in cgicso.c for cgiemail 1.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long query parameter.
by isox
CVE-2001-1067 EXPLOITDB c VERIFIED
Aol Server - Buffer Overflow
Buffer overflow in AOLserver 3.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via an HTTP request with a long Authorization header.
by qitest1
CVE-2001-1093 EXPLOITDB c VERIFIED
Compaq Tru64 - Buffer Overflow
Buffer overflow in msgchk in Digital UNIX 4.0G and earlier allows local users to execute arbitrary code via a long command line argument.
by seo
CVE-2001-0979 EXPLOITDB c VERIFIED
Hp-ux - Buffer Overflow
Buffer overflow in swverify in HP-UX 11.0, and possibly other programs, allows local users to gain privileges via a long command line argument.
by foo
EIP-2026-103843 EXPLOITDB c VERIFIED
Apache 1.0/1.2/1.3 - Server Address Disclosure
by magnum
CVE-2001-1133 EXPLOITDB c VERIFIED
BSDI 3.0-3.1 - DoS
Vulnerability in a system call in BSDI 3.0 and 3.1 allows local users to cause a denial of service (reboot) in the kernel via a particular sequence of instructions.
by V9
CVE-2001-0653 EXPLOITDB c VERIFIED
Sendmail <8.11.6 - Memory Corruption
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.
CVE-2001-0653 EXPLOITDB c VERIFIED
Sendmail <8.11.6 - Memory Corruption
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.
by grange
CVE-2001-0506 EXPLOITDB c VERIFIED
Microsoft Internet Information Server - Buffer Overflow
Buffer overflow in ssinc.dll in IIS 5.0 and 4.0 allows local users to gain system privileges via a Server-Side Includes (SSI) directive for a long filename, which triggers the overflow when the directory name is added, aka the "SSI privilege elevation" vulnerability.
by Indigo
CVE-2001-0652 EXPLOITDB c VERIFIED
Solaris 2.6-8 - Privilege Escalation
Heap overflow in xlock in Solaris 2.6 through 8 allows local users to gain root privileges via a long (1) XFILESEARCHPATH or (2) XUSERFILESEARCHPATH environmental variable.
by Nsfocus
CVE-2001-0652 EXPLOITDB c VERIFIED
Solaris 2.6-8 - Privilege Escalation
Heap overflow in xlock in Solaris 2.6 through 8 allows local users to gain root privileges via a long (1) XFILESEARCHPATH or (2) XUSERFILESEARCHPATH environmental variable.
by Nsfocus
CVE-2001-1009 EXPLOITDB c VERIFIED
Fetchmail < 5.8.14 - Access Control
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
by Salvatore Sanfilippo -antirez-
CVE-2001-1009 EXPLOITDB c VERIFIED
Fetchmail < 5.8.14 - Access Control
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
by Sanfillipo antirez
CVE-2001-1259 EXPLOITDB c VERIFIED
Avaya Argent Office - DoS
Avaya Argent Office allows remote attackers to cause a denial of service by sending UDP packets to port 53 with no payload.
by Jacek Lipkowski
CVE-2001-0941 EXPLOITDB c VERIFIED
Oracle Database Server - Buffer Overflow
Buffer overflow in dbsnmp in Oracle 8.0.6 through 9.0.1 allows local users to execute arbitrary code via a long ORACLE_HOME environment variable.
by Juan Manuel Pascual Escribá
CVE-2001-0833 EXPLOITDB c VERIFIED
Oracle Database Server < 9.0.1 - Buffer Overflow
Buffer overflow in otrcrep in Oracle 8.0.x through 9.0.1 allows local users to execute arbitrary code via a long ORACLE_HOME environment variable, aka the "Oracle Trace Collection Security Vulnerability."
by Juan Manuel Pascual Escribá
CVE-2001-1036 EXPLOITDB c VERIFIED
GNU locate in findutils <4.1 - Privilege Escalation
GNU locate in findutils 4.1 on Slackware 7.1 and 8.0 allows local users to gain privileges via an old formatted filename database (locatedb) that contains an entry with an out-of-range offset, which causes locate to write to arbitrary process memory.
by Josh Smith
CVE-2001-0548 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in dtmail in Solaris 2.6 and 7 allows local users to gain privileges via the MAIL environment variable.
by NSFOCUS Security Team
EIP-2026-100684 EXPLOITDB c VERIFIED
FreeBSD - '/usr/bin/top' Format String
by truefinder
CVE-2001-0499 EXPLOITDB c VERIFIED
Oracle8i < 8.1.7 - Buffer Overflow
Buffer overflow in Transparent Network Substrate (TNS) Listener in Oracle 8i 8.1.7 and earlier allows remote attackers to gain privileges via a long argument to the commands (1) STATUS, (2) PING, (3) SERVICES, (4) TRC_FILE, (5) SAVE_CONFIG, or (6) RELOAD.
by benjurry
CVE-2001-1354 EXPLOITDB c VERIFIED
NetWin Authentication module - Info Disclosure
NetWin Authentication module (NWAuth) 2.0 and 3.0b, as implemented in SurgeFTP, DMail, and possibly other packages, uses weak password hashing, which could allow local users to decrypt passwords or use a different password that has the same hash value as the correct password.
by byterage