Exploitdb Exploits

3,149 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-8824 EXPLOITDB HIGH c VERIFIED
Linux Kernel < 3.2.97 - Use After Free
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
by Mohamed Ghannam
CVSS 7.8
CVE-2017-1000405 EXPLOITDB HIGH c
Linux Kernel <4.14 - Privilege Escalation
The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.
by Bindecy
CVSS 7.0
EIP-2026-119541 EXPLOITDB c VERIFIED
Microsoft Windows 10 (Build 1703 Creators Update) (x86) - 'WARBIRD' 'NtQuerySystemInformation ' Kernel Local Privilege Escalation
by XPN
CVE-2017-16994 EXPLOITDB MEDIUM c VERIFIED
Linux Kernel <4.14.2 - Info Disclosure
The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.
by Google Security Research
CVSS 5.5
CVE-2017-14961 EXPLOITDB HIGH c
Ikarussecurity Anti.virus - Improper Input Validation
In IKARUS anti.virus 2.16.7, the ntguard.sys driver contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x8300000c.
by Parvez Anwar
CVSS 7.8
CVE-2017-6331 EXPLOITDB HIGH c VERIFIED
Symantec Endpoint Protection <SEP 14 RU1 - Privilege Escalation
Prior to SEP 14 RU1 Symantec Endpoint Protection product can encounter an issue of Tamper-Protection Bypass, which is a type of attack that bypasses the real time protection for the application that is run on servers and clients.
by hyp3rlinx
CVSS 7.1
CVE-2017-5123 EXPLOITDB HIGH c
Linux Kernel 4.13 through 4.13.7 - Sandbox Escape via waitid
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
by Chris Salls
CVSS 8.8
CVE-2017-16237 EXPLOITDB HIGH c
Vir.IT eXplorer Anti-Virus <8.5.42 - Buffer Overflow
In Vir.IT eXplorer Anti-Virus before 8.5.42, the driver file (VIAGLT64.SYS) contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x8273007C.
by Parvez Anwar
CVSS 7.8
EIP-2026-116366 EXPLOITDB c
Sync Breeze Enterprise 10.0.28 - Remote Buffer Overflow (PoC)
by Ivan Ivanovic
CVE-2017-15920 EXPLOITDB HIGH c
Watchdogdevelopment Anti-malware - NULL Pointer Dereference
In Watchdog Anti-Malware 2.74.186.150 and Online Security Pro 2.74.186.150, the zam32.sys driver contains a NULL pointer dereference vulnerability that gets triggered when sending an operation to ioctl 0x80002054. This is due to the input buffer being NULL or the input buffer size being 0 as they are not validated.
by Parvez Anwar
CVSS 7.5
CVE-2017-15921 EXPLOITDB HIGH c
Watchdogdevelopment Anti-malware - NULL Pointer Dereference
In Watchdog Anti-Malware 2.74.186.150 and Online Security Pro 2.74.186.150, the zam32.sys driver contains a NULL pointer dereference vulnerability that gets triggered when sending an operation to ioctl 0x80002010. This is due to the input buffer being NULL or the input buffer size being 0 as they are not validated.
by Parvez Anwar
CVSS 7.5
CVE-2017-5123 EXPLOITDB HIGH c
Linux Kernel 4.13 through 4.13.7 - Sandbox Escape via waitid
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
by @XeR_0x2A & @chaign_c
CVSS 8.8
EIP-2026-102643 EXPLOITDB c
Linux Kernel - 'AF_PACKET' Use-After-Free (1)
by SecuriTeam
CVE-2017-7533 EXPLOITDB HIGH c
Linux Kernel <4.12.4 - Privilege Escalation
Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
by Jeremy Huang
CVSS 7.0
CVE-2017-14489 EXPLOITDB MEDIUM c
Linux kernel <4.13.2 - DoS
The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (panic) by leveraging incorrect length validation.
by Wang Chenyu
CVSS 5.5
CVE-2017-1000253 EXPLOITDB HIGH c
Linux - Info Disclosure
Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
by Qualys Corporation
CVSS 7.8
CVE-2017-14311 EXPLOITDB HIGH c
NetMechanica NetDecision 5.8.2 - Privilege Escalation
The Winring0x32.sys driver in NetMechanica NetDecision 5.8.2 allows local users to gain privileges via a crafted 0x9C402088 IOCTL call.
by Peter Baris
CVSS 7.8
EIP-2026-103021 EXPLOITDB c VERIFIED
Tor (Linux) - X11 Linux Sandbox Breakout
by Google Security Research
CVE-2016-7608 EXPLOITDB MEDIUM c
Apple Mac OS X < 10.12.1 - Information Disclosure
An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "IOFireWireFamily" component, which allows local users to obtain sensitive information from kernel memory via unspecified vectors.
by Brandon Azad
CVSS 5.5
CVE-2017-2388 EXPLOITDB MEDIUM c
Apple <10.12.4 - DoS
An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "IOFireWireFamily" component. It allows attackers to cause a denial of service (NULL pointer dereference) via a crafted app.
by Brandon Azad
CVSS 5.5
CVE-2017-1000112 EXPLOITDB HIGH c VERIFIED
Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
by Andrey Konovalov
CVSS 7.0
EIP-2026-101186 EXPLOITDB c
CenturyLink ZyXEL PK5001Z Router - Root Remote Code Execution
by oxagast
CVE-2017-3630 EXPLOITDB MEDIUM c VERIFIED
Solaris RSH Stack Clash Privilege Escalation
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
by Qualys Corporation
CVSS 5.3
CVE-2017-3629 EXPLOITDB HIGH c VERIFIED
Oracle Sun Systems Products Suite Kernel - Takeover
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
by Qualys Corporation
CVSS 7.8
CVE-2017-1000370 EXPLOITDB HIGH c VERIFIED
Linux Kernel <4.11.5 - RCE
The offset2lib patch as used in the Linux Kernel contains a vulnerability that allows a PIE binary to be execve()'ed with 1GB of arguments or environmental strings then the stack occupies the address 0x80000000 and the PIE binary is mapped above 0x40000000 nullifying the protection of the offset2lib patch. This affects Linux Kernel version 4.11.5 and earlier. This is a different issue than CVE-2017-1000371. This issue appears to be limited to i386 based systems.
by Qualys Corporation
CVSS 7.8