C Exploits

3,564 exploits tracked across all sources.

Sort: Activity Stars
CVE-2003-0293 EXPLOITDB c VERIFIED
PalmOS - DoS
PalmOS allows remote attackers to cause a denial of service (CPU consumption) via a flood of ICMP echo request (ping) packets.
by Shaun Colley
CVE-2003-0289 EXPLOITDB c VERIFIED
cdrecord <2.0 - Privilege Escalation
Format string vulnerability in scsiopen.c of the cdrecord program in cdrtools 2.0 allows local users to gain privileges via format string specifiers in the dev parameter.
by CMN
CVE-2003-0201 EXPLOITDB c VERIFIED
Samba - Buffer Overflow
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.
by eDSee
CVE-2003-0281 EXPLOITDB c VERIFIED
Firebird <1.5 - Buffer Overflow
Buffer overflow in Firebird 1.0.2 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows local users to execute arbitrary code via a long INTERBASE environment variable when calling (1) gds_inet_server, (2) gds_lock_mgr, or (3) gds_drop.
by bob
CVE-2003-0290 EXPLOITDB c VERIFIED
eServ <2.9x - DoS
Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated.
by rash
CVE-2002-2087 EXPLOITDB c VERIFIED
Borland Software Interbase - Buffer Overflow
Buffer overflow in Borland InterBase 6.0 allows local users to execute arbitrary code via a long INTERBASE environment variable when calling (1) gds_drop, (2) gds_lock_mgr, or (3) gds_inet_server.
by bob
CVE-2003-0220 EXPLOITDB c VERIFIED
Kerio Personal Firewall <2.1.4 - RCE
Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet.
by Burebista
EIP-2026-114791 EXPLOITDB c VERIFIED
Mod_Gzip 1.3.x - Debug Mode
by xCrZx
CVE-2003-0262 EXPLOITDB c VERIFIED
leksbot 1.2.3 - Privilege Escalation
leksbot 1.2.3 in Debian GNU/Linux installs the KATAXWR as setuid root, which allows local users to gain root privileges by exploiting unknown vulnerabilities related to the escalated privileges, which KATAXWR is not designed to have.
by gunzip
EIP-2026-117171 EXPLOITDB c VERIFIED
FlashFXP 1.4 - User Password Encryption
by DVDMAN
CVE-2003-1480 EXPLOITDB c VERIFIED
Mysql - Cryptographic Issue
MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods.
by Secret Squirrel
CVE-2002-1643 EXPLOITDB c VERIFIED
Realnetworks Helix Universal Server - Buffer Overflow
Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments.
by Johnny Cyberpunk
CVE-2003-0220 EXPLOITDB c VERIFIED
Kerio Personal Firewall <2.1.4 - RCE
Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet.
by ThreaT
CVE-2003-0161 EXPLOITDB c VERIFIED
Hp-ux - Buffer Overflow
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
by bysin
CVE-2003-0190 EXPLOITDB c VERIFIED
Openbsd Openssh < 3.6.1 - Information Disclosure
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
by Maurizio Agazzini
EIP-2026-118770 EXPLOITDB c VERIFIED
MDG Web Server 4D 3.6 - HTTP Command Buffer Overflow
by badpack3t
CVE-2003-0276 EXPLOITDB c VERIFIED
Pi3Web 2.0.1 - Buffer Overflow
Buffer overflow in Pi3Web 2.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a GET request with a large number of / characters.
by aT4r
CVE-2003-1452 EXPLOITDB c VERIFIED
Qualcomm qpopper <4.05 - Code Injection
Untrusted search path vulnerability in Qualcomm qpopper 4.0 through 4.05 allows local users to execute arbitrary code by modifying the PATH environment variable to reference a malicious smbpasswd program.
by Xpl017Elz
CVE-2003-0276 EXPLOITDB c VERIFIED
Pi3Web 2.0.1 - Buffer Overflow
Buffer overflow in Pi3Web 2.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a GET request with a large number of / characters.
by Angelo Rosiello
CVE-2003-0213 EXPLOITDB c VERIFIED
Poptop Pptp Server - Buffer Overflow
ctrlpacket.c in PoPToP PPTP server before 1.1.4-b3 allows remote attackers to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.
by blightninjas
CVE-2003-0390 EXPLOITDB c VERIFIED
Options Parsing Tool <3.18 - Buffer Overflow
Multiple buffer overflows in Options Parsing Tool (OPT) shared library 3.18 and earlier, when used in setuid programs, may allow local users to execute arbitrary code via long command line options that are fed into macros such as opt_warn_2, as used in functions such as opt_atoi.
by kf
EIP-2026-102765 EXPLOITDB c VERIFIED
Xeneo Web Server 2.2.10 - Undisclosed Buffer Overflow (PoC)
by badpack3t
EIP-2026-114440 EXPLOITDB c VERIFIED
XMB Forum 1.8 - 'member.php' SQL Injection
EIP-2026-115048 EXPLOITDB c VERIFIED
Chindi Server 1.0 - Denial of Service
by Luca Ercoli
CVE-2003-0171 EXPLOITDB c VERIFIED
DirectoryServices - Local Command Execution
DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.
by Neeko Oni