header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Vertias Netbackup Win32 format string exploit

This is a format string exploit for Vertias Netbackup on Win32 systems. The exploit code overwrites either the PEBFastlock or SEH depending on the target system. The exploit is designed for Windows 2000 and Windows XP pre-SP2 for the PEBFastlock overwrite, and Windows XP SP2 for the SEH overwrite. The exploit code is available at the website digitalmunition.com.

VERITAS NetBackup Format Strings Linux/x86 Remote Exploit

This is an exploit for a format string vulnerability in VERITAS NetBackup on Linux/x86. The exploit allows for remote code execution with root privileges. The vulnerability was discovered by kf_lists[at]digitalmunition[dot]com and the exploit was developed by johnh[at]digitalmunition[dot]com. The exploit works by sending a specially crafted request to the target server, triggering the format string vulnerability and executing the provided shellcode.

Veritas Netbackup hostname overflow

Multiple unspecified local buffer overrun and format string vulnerabilities have been reported to exist in various setuid Veritas NetBackup binaries. These issues may be exploited to execute arbitrary code with root privileges.

Veritas NetBackup Multiple Local Buffer Overrun and Format String Vulnerabilities

Multiple unspecified local buffer overrun and format string vulnerabilities have been reported to exist in various setuid Veritas NetBackup binaries. These issues may be exploited to execute arbitrary code with root privileges.

VERITAS NetBackup Format Strings OSX/ppc Remote Exploit

VERITAS NetBackup is vulnerable to a format string vulnerability on OSX/ppc. This vulnerability can be exploited remotely by sending a specially crafted packet to the NetBackup service. This packet contains a malicious payload which is then executed on the vulnerable system.

NetBackup 7.0 – ‘NetBackup INET Daemon’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Recent Exploits: