Exploitdb Exploits

3,149 exploits tracked across all sources.

Sort: Activity Stars
CVE-2005-3488 EXPLOITDB c VERIFIED
Scorched 3D - Denial of Service
Scorched 3D 39.1 (bf) and earlier allows remote attackers to cause a denial of service (long loop and server hang) via a negative numplayers value that bypasses a signed check in ServerConnectHandler.cpp.
by Luigi Auriemma
EIP-2026-115330 EXPLOITDB c VERIFIED
GO-Global Windows Server 3.1.0.3270 - Buffer Overflow (PoC)
by Luigi Auriemma
CVE-2005-3483 EXPLOITDB c VERIFIED
Graphon Go-global - Memory Corruption
Buffer overflow in GO-Global for Windows 3.1.0.3270 and earlier allows remote attackers to execute arbitrary code via a data block that is longer than the specified data block size.
by Luigi Auriemma
CVE-2005-3485 EXPLOITDB c VERIFIED
Glider Collectn Kill - Memory Corruption
Buffer overflow in Glider Collect'n kill 1.0.0.0 allows remote attackers to execute arbitrary code via a gl_playerEnter command with a long player name.
by Luigi Auriemma
CVE-2005-3492 EXPLOITDB c VERIFIED
Johannes F. Kuhlmann Flatfrag - Denial of Service
FlatFrag 0.3 and earlier allows remote attackers to cause a denial of service (crash) by sending an NT_CONN_OK command from a client that is not connected, which triggers a null dereference.
by Luigi Auriemma
EIP-2026-114991 EXPLOITDB c VERIFIED
Blitzkrieg 2 < 1.21 - 'Server/Client' Denial of Service
by Luigi Auriemma
CVE-2005-3493 EXPLOITDB c VERIFIED
Afsl Games Battle Carry < .005 - Denial of Service
Battle Carry .005 and earlier allows remote attackers to cause a denial of service (inaccessible port) via a large packet, which triggers a socket error and terminates the socket that is listening on the server's UDP port.
by Luigi Auriemma
EIP-2026-118914 EXPLOITDB c VERIFIED
Mirabilis ICQ 2003a - Remote Buffer Overflow Download Shellcode
by ATmaCA
CVE-2005-3475 EXPLOITDB c VERIFIED
Hasbani Web Server - Denial of Service
Hasbani Web Server (WindWeb) 2.0 allows remote attackers to cause a denial of service (infinite loop) via HTTP crafted GET requests.
by Expanders
CVE-2005-1294 EXPLOITDB c VERIFIED
Affix Bluetooth Protocol Stack - Privilege Escalation
The affix_sock_register in the Affix Bluetooth Protocol Stack for Linux might allow local users to gain privileges via a socket call with a negative protocol value, which is used as an array index.
by qobaiashi
CVE-2005-3252 EXPLOITDB c VERIFIED
Sourcefire Snort - Buffer Overflow
Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet.
by rd
CVE-2005-2120 EXPLOITDB c VERIFIED
Microsoft Windows 2000 - Buffer Overflow
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
by Winny Thomas
CVE-2005-2120 EXPLOITDB c VERIFIED
Microsoft Windows 2000 - Buffer Overflow
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
by anonymous
CVE-2005-2943 EXPLOITDB c VERIFIED
XMail <1.22 - Buffer Overflow
Stack-based buffer overflow in sendmail in XMail before 1.22 allows remote attackers to execute arbitrary code via a long -t command line option.
by qaaz
CVE-2005-2973 EXPLOITDB c VERIFIED
Linux <2.6.14-rc5 - DoS
The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
by Rémi Denis-Courmont
CVE-2005-0750 EXPLOITDB c VERIFIED
Linux Kernel <2.6.11.5 - Privilege Escalation
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
by backdoored.net
EIP-2026-103131 EXPLOITDB c VERIFIED
Half-Life Server 3.1.1.0 - Remote Buffer Overflow
by greuff
CVE-2005-3190 EXPLOITDB c VERIFIED
Computer Associates iGateway <4.0.050623 - RCE
Buffer overflow in Computer Associates (CA) iGateway 3.0 and 4.0 before 4.0.050623, when running in debug mode, allows remote attackers to execute arbitrary code via HTTP GET requests.
by egm
CVE-2005-2661 EXPLOITDB c VERIFIED
up-imapproxy <1.2.4 - RCE
Format string vulnerability in the ParseBannerAndCapability function in main.c for up-imapproxy 1.2.3 and 1.2.4 allows remote IMAP servers to execute arbitrary code via format string specifiers in a banner or capability line.
by Steve Kemp
CVE-2005-0023 EXPLOITDB c VERIFIED
GNOME libzvt2/libvte4 - Info Disclosure
gnome-pty-helper in GNOME libzvt2 and libvte4 allows local users to spoof the logon hostname via a modified DISPLAY environment variable. NOTE: the severity of this issue has been disputed.
by Paul Szabo
CVE-2005-3135 EXPLOITDB c VERIFIED
Virtools Web Player <3.0.0.100 - RCE
Buffer overflow in Virtools Web Player 3.0.0.100 and earlier allows remote attackers to execute arbitrary code via a long filename.
by Luigi Auriemma
CVE-2005-2961 EXPLOITDB c VERIFIED
ProZilla 1.3.7.4 - Buffer Overflow
Buffer overflow in the get_string_ahref function for ProZilla 1.3.7.4 and possibly earlier, with the -ftpsearch option enabled, allows remote servers to execute arbitrary code via a search response with a crafted string in the HREF field of an <A> tag.
by taviso
EIP-2026-118933 EXPLOITDB c VERIFIED
MultiTheftAuto 0.5 - Multiple Vulnerabilities
by Luigi Auriemma
CVE-2005-3064 EXPLOITDB c VERIFIED
MultiTheftAuto <0.5 - Command Injection
MultiTheftAuto 0.5 patch 1 and earlier does not properly verify client privileges when running command 40, which allows remote attackers to change or delete the message of the day (motd.txt).
by Luigi Auriemma
CVE-2005-2710 EXPLOITDB c VERIFIED
Real HelixPlayer & RealPlayer 10 - RCE
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
by c0ntex