Exploitdb Exploits
3,149 exploits tracked across all sources.
Freebsd - Denial of Service
NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option.
by y3t1
Linux pam_console - Info Disclosure
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
by Michal Zalewski
Microsoft Windows 95 - Denial of Service
Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name.
by rain forest puppy
Brecht Claerhout Sniffit - Buffer Overflow
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
by MaXX
Brecht Claerhout Sniffit - Buffer Overflow
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
by FuSyS
Lsoft Listserv - Buffer Overflow
Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote attackers to execute arbitrary commands.
by David Litchfield
Suse Linux - Buffer Overflow
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable.
by bladi
SUN Solaris - Buffer Overflow
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
by DiGiT
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option.
by DiGiT
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by Theodor Ragnar Gislason
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by Theodor Ragnar Gislason
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by DiGiT
MailStudio 2000 <2.0 - RCE
userreg.cgi CGI program in MailStudio 2000 2.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.
by fygrave
Lcdproc - Buffer Overflow
Buffer overflow in LCDproc allows remote attackers to gain root privileges via the screen_add command.
by Andrew Hobgood
Microsoft Windows Server 2000/95/98/NT 4.0 - Long Filename Extension
by Laurent Eschenauer
Redhat Linux - Denial of Service
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
by Michal Zalewski
QNX - Info Disclosure
The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.
by Sean
CRYPTOCard CryptoAdmin for PalmOS - Info Disclosure
CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate valid PT-1 tokens after cracking the PIN.
by kingpin
Bray Systems Linux Trustees - Denial of Service
The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name.
by Andrey E. Lerman
Cygnus Network Security - Buffer Overflow
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
by Jim Paris
PcAnywhere 9.x - Info Disclosure
The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts.
by Pascal Longpre
Netscape PublishingXpert <2.5 - Info Disclosure
PSCOErrPage.htm in Netscape PublishingXpert 2.5 before SP2 allows remote attackers to read arbitrary files by specifying the target file in the errPagePath parameter.
by \x00\x00
Citrix ICA - Info Disclosure
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
by Dug Song
SGI IRIX - Privilege Escalation
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.
by Last Stage of Delirium
Linux Kernel - Denial of Service
The Linux 2.2.x kernel does not restrict the number of Unix domain sockets as defined by the wmem_max parameter, which allows local users to cause a denial of service by requesting a large number of sockets.
by Jay Fenlason
By Source