C Exploits

3,571 exploits tracked across all sources.

Sort: Activity Stars
CVE-2000-0343 EXPLOITDB c VERIFIED
Brecht Claerhout Sniffit - Buffer Overflow
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
by MaXX
CVE-2000-0343 EXPLOITDB c VERIFIED
Brecht Claerhout Sniffit - Buffer Overflow
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
by FuSyS
CVE-2000-0425 EXPLOITDB c VERIFIED
Lsoft Listserv - Buffer Overflow
Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote attackers to execute arbitrary commands.
by David Litchfield
CVE-2000-0340 EXPLOITDB c VERIFIED
Suse Linux - Buffer Overflow
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable.
by bladi
CVE-2000-0337 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
by DiGiT
CVE-2000-0316 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option.
by DiGiT
CVE-2000-0317 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by Theodor Ragnar Gislason
CVE-2000-0317 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by Theodor Ragnar Gislason
CVE-2000-0317 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by DiGiT
CVE-2000-0527 EXPLOITDB c VERIFIED
MailStudio 2000 <2.0 - RCE
userreg.cgi CGI program in MailStudio 2000 2.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.
by fygrave
CVE-2000-0295 EXPLOITDB c VERIFIED
Lcdproc - Buffer Overflow
Buffer overflow in LCDproc allows remote attackers to gain root privileges via the screen_add command.
by Andrew Hobgood
EIP-2026-117580 EXPLOITDB c VERIFIED
Microsoft Windows Server 2000/95/98/NT 4.0 - Long Filename Extension
by Laurent Eschenauer
CVE-2000-0286 EXPLOITDB c VERIFIED
Redhat Linux - Denial of Service
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
by Michal Zalewski
CVE-2000-0250 EXPLOITDB c VERIFIED
QNX - Info Disclosure
The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.
by Sean
CVE-2000-0275 EXPLOITDB c VERIFIED
CRYPTOCard CryptoAdmin for PalmOS - Info Disclosure
CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate valid PT-1 tokens after cracking the PIN.
by kingpin
CVE-2000-0274 EXPLOITDB c VERIFIED
Bray Systems Linux Trustees - Denial of Service
The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name.
by Andrey E. Lerman
CVE-2000-0389 EXPLOITDB c VERIFIED
Cygnus Network Security - Buffer Overflow
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
by Jim Paris
CVE-2000-0300 EXPLOITDB c VERIFIED
PcAnywhere 9.x - Info Disclosure
The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts.
by Pascal Longpre
CVE-2000-1196 EXPLOITDB c VERIFIED
Netscape PublishingXpert <2.5 - Info Disclosure
PSCOErrPage.htm in Netscape PublishingXpert 2.5 before SP2 allows remote attackers to read arbitrary files by specifying the target file in the errPagePath parameter.
by \x00\x00
CVE-2000-0244 EXPLOITDB c VERIFIED
Citrix ICA - Info Disclosure
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
by Dug Song
CVE-2000-0245 EXPLOITDB c VERIFIED
SGI IRIX - Privilege Escalation
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.
by Last Stage of Delirium
CVE-2000-0227 EXPLOITDB c VERIFIED
Linux Kernel - Denial of Service
The Linux 2.2.x kernel does not restrict the number of Unix domain sockets as defined by the wmem_max parameter, which allows local users to cause a denial of service by requesting a large number of sockets.
by Jay Fenlason
CVE-2000-0236 EXPLOITDB c VERIFIED
Netscape Enterprise Server - Info Disclosure
Netscape Enterprise Server with Directory Indexing enabled allows remote attackers to list server directories via web publishing tags such as ?wp-ver-info and ?wp-cs-dump.
by Gabriel Maggiotti
CVE-2000-0052 EXPLOITDB c VERIFIED
Red Hat userhelper - Privilege Escalation
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
by Elias Levy
CVE-2000-0198 EXPLOITDB c VERIFIED
Atrium Software Mercur Imap4 Server - Buffer Overflow
Buffer overflow in POP3 and IMAP servers in the MERCUR mail server suite allows remote attackers to cause a denial of service.
by Ussr Labs