C Exploits

3,570 exploits tracked across all sources.

Sort: Activity Stars
CVE-2001-0823 EXPLOITDB c VERIFIED
PCP <2.2.1-3 - Privilege Escalation
The pmpost program in Performance Co-Pilot (PCP) before 2.2.1-3 allows a local user to gain privileges via a symlink attack on the NOTICES file in the PCP log directory (PCP_LOG_DIR).
by IhaQueR
CVE-2002-1904 EXPLOITDB c VERIFIED
Gaztek Ghttpd - Buffer Overflow
Buffer overflow in the Log function in util.c in GazTek ghttpd 1.4 through 1.4.3 allows remote attackers to execute arbitrary code via a long HTTP GET request.
by qitest1
CVE-2001-1163 EXPLOITDB c VERIFIED
Munica Corporation NetSQL 1.0 - RCE
Buffer overflow in Munica Corporation NetSQL 1.0 allows remote attackers to execute arbitrary code via a long CONNECT argument to port 6500.
by Sergio Monteiro
CVE-2001-0759 EXPLOITDB c VERIFIED
Jetico Bestcrypt - Buffer Overflow
Buffer overflow in bctool in Jetico BestCrypt 0.8.1 and earlier allows local users to execute arbitrary code via a file or directory with a long pathname, which is processed during an unmount.
by Carl Livitt
CVE-2001-0764 EXPLOITDB c VERIFIED
Juergen Schoenwaelder Scotty - Buffer Overflow
Buffer overflow in ntping in scotty 2.1.0 allows local users to execute arbitrary code via a long hostname as a command line argument.
by Larry W. Cashdollar
CVE-2001-0093 EXPLOITDB c VERIFIED
FreeBSD 1.5 - Privilege Escalation
Vulnerability in telnetd in FreeBSD 1.5 allows local users to gain root privileges by modifying critical environmental variables that affect the behavior of telnetd.
by Teso
CVE-2001-0787 EXPLOITDB c VERIFIED
LPRng - Privilege Escalation
LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.
by zen-parse
CVE-2001-0762 EXPLOITDB c VERIFIED
Su-wrapper - Buffer Overflow
Buffer overflow in su-wrapper 1.1.1 allows local users to execute arbitrary code via a long first argument.
by dex
EIP-2026-103195 EXPLOITDB c VERIFIED
PKCrew TIAtunnel 0.9 alpha2 - Authentication Mechanism Buffer Overflow
by qitest1
CVE-2001-0526 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in the Xview library as used by mailtool in Solaris 8 and earlier allows a local attacker to gain privileges via the OPENWINHOME environment variable.
by 51
CVE-2001-1076 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in whodo in Solaris SunOS 5.5.1 through 5.8 allows local users to execute arbitrary code via a long (1) SOR or (2) CFIME environment variable.
by Pablo Sor
CVE-2001-1347 EXPLOITDB c VERIFIED
Windows 2000 - DoS
Windows 2000 allows local users to cause a denial of service and possibly gain privileges by setting a hardware breakpoint that is handled using global debug registers, which could cause other processes to terminate due to an exception, and allow hijacking of resources such as named pipes.
by Georgi Guninski
CVE-2001-0333 EXPLOITDB c VERIFIED
Microsoft Internet Information Server < 5.0 - Path Traversal
Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
by HuXfLuX
CVE-2001-0333 EXPLOITDB c VERIFIED
Microsoft Internet Information Server < 5.0 - Path Traversal
Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
by MovAX
CVE-2001-0333 EXPLOITDB c VERIFIED
Microsoft Internet Information Server < 5.0 - Path Traversal
Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
by Filip Maertens
CVE-2001-0241 EXPLOITDB c VERIFIED
Microsoft Windows 2000 - Buffer Overflow
Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0.
by dark spyrit
CVE-2000-0573 EXPLOITDB c VERIFIED
wu-ftpd <2.6.0 - Code Injection
The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.
by qitest1
CVE-2001-0241 EXPLOITDB c VERIFIED
Microsoft Windows 2000 - Buffer Overflow
Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0.
by Ryan Permeh
CVE-2001-0486 EXPLOITDB c VERIFIED
Novell Bordermanager < 3.6 - Denial of Service
Remote attackers can cause a denial of service in Novell BorderManager 3.6 and earlier by sending TCP SYN flood to port 353.
by honoriak
CVE-2001-0241 EXPLOITDB c VERIFIED
Microsoft Windows 2000 - Buffer Overflow
Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0.
by dark spyrit
CVE-2001-0490 EXPLOITDB c VERIFIED
Nullsoft Winamp - Buffer Overflow
Buffer overflow in WINAMP 2.6x and 2.7x allows attackers to execute arbitrary code via a long string in an AIP file.
by byterage
CVE-2001-0485 EXPLOITDB c VERIFIED
IRIX 6.2 - Command Injection
Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges attacker to execute arbitrary commands via the -n option.
by V9
CVE-2001-0296 EXPLOITDB c VERIFIED
Texas Imperial Software Wftpd Pro - Buffer Overflow
Buffer overflow in WFTPD Pro 3.00 allows remote attackers to execute arbitrary commands via a long CWD command.
by Len Budney
CVE-2001-1442 EXPLOITDB c VERIFIED
ISC InterNetNews <2.3.0 - Privilege Escalation
Buffer overflow in innfeed for ISC InterNetNews (INN) before 2.3.0 allows local users in the "news" group to gain privileges via a long -c command line argument.
by Enrique A.
CVE-2001-0838 EXPLOITDB c VERIFIED
Network Solutions Rwhoisd <1.5.x - RCE
Format string vulnerability in Network Solutions Rwhoisd 1.5.x allows remote attackers to execute arbitrary code via format string specifiers in the -soa command.
by CowPower