Exploitdb Exploits

3,149 exploits tracked across all sources.

Sort: Activity Stars
CVE-2014-0196 EXPLOITDB MEDIUM c
Linux kernel <3.14.3 - DoS
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
by Matthew Daley
CVSS 5.5
EIP-2026-115783 EXPLOITDB c VERIFIED
Microsoft Windows - Touch Injection API Local Denial of Service
by Tavis Ormandy
CVE-2014-1849 EXPLOITDB c VERIFIED
Foscam IP camera <11.37.2.49 - RCE
Foscam IP camera 11.37.2.49 and other versions, when using the Foscam DynDNS option, generates credentials based on predictable camera subdomain names, which allows remote attackers to spoof or hijack arbitrary cameras and conduct other attacks by modifying arbitrary camera records in the Foscam DNS server.
by Sergey Shekyan
CVE-2013-5211 EXPLOITDB c
NTP Monitor List Scanner
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
by Danilo PC
CVE-2014-0346 EXPLOITDB c VERIFIED
Rejected
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0160. Reason: This candidate is a reservation duplicate of CVE-2014-0160. Notes: All CVE users should reference CVE-2014-0160 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
by Ayman Sagy
CVE-2014-1322 EXPLOITDB c VERIFIED
Apple Mac OS X < 10.9.2 - Information Disclosure
The kernel in Apple OS X through 10.9.2 places a kernel pointer into an XNU object data structure accessible from user space, which makes it easier for local users to bypass the ASLR protection mechanism by reading an unspecified attribute of the object.
by Ian Beer
CVE-2014-2851 EXPLOITDB c
Linux Kernel < 3.2.60 - Use After Free
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
by Thomas Pollet
EIP-2026-101444 EXPLOITDB c
Sercomm TCP/32674 - Backdoor Reactivation
by Synacktiv
EIP-2026-104578 EXPLOITDB c
Apple Mac OSX (Lion) Kernel xnu-1699.32.7 except xnu-1699.24.8 NFS Mount - Local Privilege Escalation
by Kenzley Alphonse
CVE-2014-0346 EXPLOITDB c VERIFIED
Rejected
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0160. Reason: This candidate is a reservation duplicate of CVE-2014-0160. Notes: All CVE users should reference CVE-2014-0160 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
by prdelka
CVE-2013-6799 EXPLOITDB c
Apple Mac OS X - Memory Corruption
Apple Mac OS X 10.9 allows local users to cause a denial of service (memory corruption or panic) by creating a hard link to a directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-0105.
by Maksymilian Arciemowicz
EIP-2026-115431 EXPLOITDB c
Immunity Debugger 1.85 - Stack Overflow (PoC)
by Veysel HATAS
EIP-2026-114689 EXPLOITDB c
QNX 6.5.0 x86 phfont - Local Privilege Escalation
by cenobyte
EIP-2026-114688 EXPLOITDB c
QNX 6.5.0 x86 io-graphics - Local Privilege Escalation
by cenobyte
CVE-2013-6282 EXPLOITDB HIGH c
Android get_user/put_user Exploit
The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
by Piotr Szerman
CVSS 8.8
CVE-2008-1461 EXPLOITDB c VERIFIED
XnView 1.92.1 - RCE
Buffer overflow in XnView 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long filename argument on the command line. NOTE: it is unclear whether there are common handler configurations in which this argument is controlled by an attacker.
by Sylvain THUAL
CVE-2014-0038 EXPLOITDB c VERIFIED
Linux Kernel recvmmsg Privilege Escalation
The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
by rebel
CVE-2014-0038 EXPLOITDB c VERIFIED
Linux Kernel recvmmsg Privilege Escalation
The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
by saelo
CVE-2014-0038 EXPLOITDB c
Linux Kernel recvmmsg Privilege Escalation
The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
by Kees Cook
CVE-2009-3547 EXPLOITDB HIGH c
Linux Kernel < 2.6.31.14 - Race Condition
Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
by spender
CVSS 7.0
EIP-2026-116262 EXPLOITDB c
SoftMaker Office 2012 - TextMaker Memory Corruption
by Arash Allebrahim
CVE-2012-2336 EXPLOITDB c VERIFIED
PHP <5.3.13 & <5.4.3 - DoS
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
by kingcope
CVE-2012-0217 EXPLOITDB c VERIFIED
FreeBSD Intel SYSRET Privilege Escalation
The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
by CurcolHekerLink
CVE-2013-4788 EXPLOITDB c
GNU C Library <2.17 - Buffer Overflow
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
by Hector Marco & Ismael Ripoll
CVE-2013-5701 EXPLOITDB c VERIFIED
Watchguard Server Center < 11.7.4 - Access Control
Multiple untrusted search path vulnerabilities in (1) Watchguard Log Collector (wlcollector.exe) and (2) Watchguard WebBlocker Server (wbserver.exe) in WatchGuard Server Center 11.7.4, 11.7.3, and possibly earlier allow local users to gain privileges via a Trojan horse wgpr.dll file in the application's bin directory.
by Julien Ahrens