C Exploits
3,565 exploits tracked across all sources.
Melange Chat System 1.10 - Buffer Overflow
Buffer overflow in Melange Chat System 1.10 allows remote attackers to cause a denial of service (chat server crash) and possibly execute arbitrary code via the msgText buffer in the chat_InterpretData function, as demonstrated via a long Nick (nickname) request.
by innerphobia
Linux kernel <2.2.x - DoS
Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.
by Michal Zalewski
MySQL <3.23.54, <4.0.6 - Privilege Escalation
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.
by Andi
Hp-ux - Buffer Overflow
Buffer overflow in swverify in HP-UX 11.0, and possibly other programs, allows local users to gain privileges via a long command line argument.
by watercloud
Hp-ux - Buffer Overflow
Buffer overflow in the Software Distributor utilities for HP-UX B.11.00 and B.11.11 allows local users to execute arbitrary code via a long LANG environment variable to setuid programs such as (1) swinstall and (2) swmodify.
by watercloud
Sun Cobalt RaQ 4 - RCE
overflow.cgi CGI script in Sun Cobalt RaQ 4 with the SHP (Security Hardening Patch) installed allows remote attackers to execute arbitrary code via a POST request with shell metacharacters in the email parameter.
by grazer
Exim <4.11 - Code Injection
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
by Thomas Wana
Boozt Standard 0.9.8 - 'index.cgi' Buffer Overrun
by BrainStorm
Marcos Luiz Onisto Lib Cgi - Memory Corruption
Buffer overflow in the changevalue function in libcgi.h for Marcos Luiz Onisto Lib CGI 0.1 allows remote attackers to execute arbitrary code via a long argument.
by Xpl017Elz
Zeroo HTTP Server - Path Traversal
Directory traversal vulnerability in Zeroo web server 1.5 allows remote attackers to read arbitrary files via a .. (dot dot) in a URL GET request.
by mikecc
Mailenable - Memory Corruption
MailEnable 1.5 015 through 1.5 018 allows remote attackers to cause a denial of service (crash) via a long USER string, possibly due to a buffer overflow.
by redsand
Hughes Technologies Libhttpd - Memory Corruption
Buffer overflow in the httpdProcessRequest function in LibHTTPD 1.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP POST request.
by Xpl017Elz
Light HTTPd 0.1 - RCE
Buffer overflow in Light HTTPd (lhttpd) 0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request.
by uid0x00
Light HTTPd 0.1 - RCE
Buffer overflow in Light HTTPd (lhttpd) 0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request.
by Xpl017Elz
Traceroute-nanog - Buffer Overflow
Buffer overflow in the get_origin function in traceroute-nanog allows attackers to execute arbitrary code via long WHOIS responses.
by Carl Livitt
BIND <8.3.4 - DoS
BIND 8.3.x through 8.3.3 allows remote attackers to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.
by spybreak
QNX Rtos - Denial of Service
The timer implementation in QNX RTOS 6.1.0 allows local users to cause a denial of service (hang) and possibly execute arbitrary code by creating multiple timers with a 1-ms tick.
by Pawel Pisarczyk
HP Cifs-9000 Server - Buffer Overflow
Buffer overflows in the cifslogin command for HP CIFS/9000 Client A.01.06 and earlier, based on the Sharity package, allows local users to gain root privileges via long (1) -U, (2) -D, (3) -P, (4) -S, (5) -N, or (6) -u parameters.
by watercloud
GlobalSunTech Access Point GL2422AP-0T - Information Disclosure
by Tom Knienieder
Abuse <2.00 - Privilege Escalation
Buffer overflow in Abuse 2.00 and earlier allows local users to gain root privileges via a long -net command line argument.
by Girish
By Source