C Exploits
3,571 exploits tracked across all sources.
Brecht Claerhout Sniffit - Buffer Overflow
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
by MaXX
Brecht Claerhout Sniffit - Buffer Overflow
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
by FuSyS
Lsoft Listserv - Buffer Overflow
Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote attackers to execute arbitrary commands.
by David Litchfield
Suse Linux - Buffer Overflow
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable.
by bladi
SUN Solaris - Buffer Overflow
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
by DiGiT
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option.
by DiGiT
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by Theodor Ragnar Gislason
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by Theodor Ragnar Gislason
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by DiGiT
MailStudio 2000 <2.0 - RCE
userreg.cgi CGI program in MailStudio 2000 2.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.
by fygrave
Lcdproc - Buffer Overflow
Buffer overflow in LCDproc allows remote attackers to gain root privileges via the screen_add command.
by Andrew Hobgood
Microsoft Windows Server 2000/95/98/NT 4.0 - Long Filename Extension
by Laurent Eschenauer
Redhat Linux - Denial of Service
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
by Michal Zalewski
QNX - Info Disclosure
The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.
by Sean
CRYPTOCard CryptoAdmin for PalmOS - Info Disclosure
CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate valid PT-1 tokens after cracking the PIN.
by kingpin
Bray Systems Linux Trustees - Denial of Service
The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name.
by Andrey E. Lerman
Cygnus Network Security - Buffer Overflow
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
by Jim Paris
PcAnywhere 9.x - Info Disclosure
The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts.
by Pascal Longpre
Netscape PublishingXpert <2.5 - Info Disclosure
PSCOErrPage.htm in Netscape PublishingXpert 2.5 before SP2 allows remote attackers to read arbitrary files by specifying the target file in the errPagePath parameter.
by \x00\x00
Citrix ICA - Info Disclosure
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
by Dug Song
SGI IRIX - Privilege Escalation
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.
by Last Stage of Delirium
Linux Kernel - Denial of Service
The Linux 2.2.x kernel does not restrict the number of Unix domain sockets as defined by the wmem_max parameter, which allows local users to cause a denial of service by requesting a large number of sockets.
by Jay Fenlason
Netscape Enterprise Server - Info Disclosure
Netscape Enterprise Server with Directory Indexing enabled allows remote attackers to list server directories via web publishing tags such as ?wp-ver-info and ?wp-cs-dump.
by Gabriel Maggiotti
Red Hat userhelper - Privilege Escalation
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
by Elias Levy
Atrium Software Mercur Imap4 Server - Buffer Overflow
Buffer overflow in POP3 and IMAP servers in the MERCUR mail server suite allows remote attackers to cause a denial of service.
by Ussr Labs
By Source