Exploitdb Exploits

3,149 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-1000366 EXPLOITDB HIGH c VERIFIED
glibc <2.25 - RCE
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
by Qualys Corporation
CVSS 7.8
CVE-2017-1000366 EXPLOITDB HIGH c VERIFIED
glibc <2.25 - RCE
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
by Qualys Corporation
CVSS 7.8
CVE-2017-1000366 EXPLOITDB HIGH c VERIFIED
glibc <2.25 - RCE
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
by Qualys Corporation
CVSS 7.8
CVE-2017-3631 EXPLOITDB MEDIUM c VERIFIED
Oracle Sun Systems Products Suite 11 - Privilege Escalation
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
by Qualys Corporation
CVSS 5.3
CVE-2017-1000373 EXPLOITDB MEDIUM c VERIFIED
OpenBSD <6.1 - RCE
The OpenBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack memory and manipulate stack memory to assist in arbitrary code execution attacks. This affects OpenBSD 6.1 and possibly earlier versions.
by Qualys Corporation
CVSS 6.5
CVE-2017-1000375 EXPLOITDB CRITICAL c VERIFIED
NetBSD <7.1 - RCE
NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows attackers to more easily manipulate memory leading to arbitrary code execution. This affects NetBSD 7.1 and possibly earlier versions.
by Qualys Corporation
CVSS 9.8
CVE-2017-1000379 EXPLOITDB HIGH c VERIFIED
Linux Kernel <4.11.5 - Memory Corruption
The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.
by Qualys Corporation
CVSS 7.8
CVE-2017-1000371 EXPLOITDB HIGH c VERIFIED
Linux Kernel - Memory Corruption
The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.
by Qualys Corporation
CVSS 7.8
CVE-2017-1000371 EXPLOITDB HIGH c VERIFIED
Linux Kernel - Memory Corruption
The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.
by Qualys Corporation
CVSS 7.8
CVE-2017-1000370 EXPLOITDB HIGH c VERIFIED
Linux Kernel <4.11.5 - RCE
The offset2lib patch as used in the Linux Kernel contains a vulnerability that allows a PIE binary to be execve()'ed with 1GB of arguments or environmental strings then the stack occupies the address 0x80000000 and the PIE binary is mapped above 0x40000000 nullifying the protection of the offset2lib patch. This affects Linux Kernel version 4.11.5 and earlier. This is a different issue than CVE-2017-1000371. This issue appears to be limited to i386 based systems.
by Qualys Corporation
CVSS 7.8
CVE-2017-1085 EXPLOITDB HIGH c VERIFIED
Freebsd < 11.2 - Memory Corruption
In FreeBSD before 11.2-RELEASE, an application which calls setrlimit() to increase RLIMIT_STACK may turn a read-only memory region below the stack into a read-write region. A specially crafted executable could be exploited to execute arbitrary code in the user context.
by Qualys Corporation
CVSS 7.8
CVE-2017-1084 EXPLOITDB HIGH c VERIFIED
Freebsd < 11.2 - Memory Corruption
In FreeBSD before 11.2-RELEASE, multiple issues with the implementation of the stack guard-page reduce the protections afforded by the guard-page. This results in the possibility a poorly written process could be cause a stack overflow.
by Qualys Corporation
CVSS 7.5
CVE-2017-1084 EXPLOITDB HIGH c VERIFIED
Freebsd < 11.2 - Memory Corruption
In FreeBSD before 11.2-RELEASE, multiple issues with the implementation of the stack guard-page reduce the protections afforded by the guard-page. This results in the possibility a poorly written process could be cause a stack overflow.
by Qualys Corporation
CVSS 7.5
CVE-2017-1000367 EXPLOITDB MEDIUM c
Todd Miller's sudo <1.8.20 - Info Disclosure & Command Execution
Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
by Qualys Corporation
CVSS 6.4
CVE-2017-7004 EXPLOITDB HIGH c VERIFIED
Apple <10.3.2, <10.12.5 - Privilege Escalation
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. The issue involves the "Security" component. A race condition allows attackers to bypass intended entitlement restrictions for sending XPC messages via a crafted app.
by Google Security Research
CVSS 7.0
CVE-2017-4916 EXPLOITDB MEDIUM c VERIFIED
VMware Workstation Pro/Player - DoS
VMware Workstation Pro/Player contains a NULL pointer dereference vulnerability that exists in the vstor2 driver. Successful exploitation of this issue may allow host users with normal user privileges to trigger a denial-of-service in a Windows host machine.
by Borja Merino
CVSS 6.5
CVE-2017-7472 EXPLOITDB MEDIUM c VERIFIED
Linux kernel <4.10.13 - DoS
The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.
by Marcus Meissner
CVSS 5.5
CVE-2017-2671 EXPLOITDB MEDIUM c VERIFIED
Linux Kernel < 4.10.8 - Denial of Service
The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
by Daniel Jiang
CVSS 5.5
EIP-2026-103652 EXPLOITDB c VERIFIED
Skia Graphics Library - Heap Overflow due to Rounding Error in SkEdge::setLine
by Google Security Research
CVE-2017-2501 EXPLOITDB HIGH c VERIFIED
Apple Iphone OS < 10.3.2 - Race Condition
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "Kernel" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app.
by Google Security Research
CVSS 7.0
EIP-2026-103409 EXPLOITDB c VERIFIED
Apple macOS/iOS Kernel - Memory Disclosure Due to Lack of Bounds Checking in netagent Socket Option Handling
by Google Security Research
CVE-2017-6978 EXPLOITDB HIGH c VERIFIED
Apple <10.12.5 - RCE/DoS
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "Accessibility Framework" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
by Google Security Research
CVSS 7.8
CVE-2017-4915 EXPLOITDB HIGH c VERIFIED
VMware Workstation Pro/Player - Privilege Escalation
VMware Workstation Pro/Player contains an insecure library loading vulnerability via ALSA sound driver configuration files. Successful exploitation of this issue may allow unprivileged host users to escalate their privileges to root in a Linux host machine.
by Google Security Research
CVSS 7.8
CVE-2017-9150 EXPLOITDB MEDIUM c VERIFIED
Linux kernel <4.11.1 - Info Disclosure
The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls.
by Google Security Research
CVSS 5.5
CVE-2017-8422 EXPLOITDB HIGH c
KDE Kauth < 5.33 - Authentication Bypass by Spoofing
KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.
by Stealth
CVSS 7.8