todb

16 exploits Active since Mar 1998
CVE-2009-3563 METASPLOIT ruby WORKING POC
Ntp < 4.2.2p4 - Denial of Service
ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
CVE-2013-4164 METASPLOIT ruby WORKING POC
Ruby - Memory Corruption
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
CVE-1999-0502 METASPLOIT ruby SCANNER
Unix - Info Disclosure
A Unix account has a default, null, blank, or missing password.
CVE-2013-0229 METASPLOIT ruby SCANNER
Miniupnpd < 1.3 - Denial of Service
The ProcessSSDPRequest function in minissdp.c in the SSDP handler in MiniUPnP MiniUPnPd before 1.4 allows remote attackers to cause a denial of service (service crash) via a crafted request that triggers a buffer over-read.
CVE-2014-3566 METASPLOIT LOW ruby SCANNER
SSL/TLS Version Detection
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
CVSS 3.4
CVE-1999-0502 METASPLOIT ruby SCANNER
Unix - Info Disclosure
A Unix account has a default, null, blank, or missing password.
CVE-1999-0502 METASPLOIT ruby SCANNER
Unix - Info Disclosure
A Unix account has a default, null, blank, or missing password.
CVE-1999-0502 METASPLOIT ruby SCANNER
Unix - Info Disclosure
A Unix account has a default, null, blank, or missing password.
CVE-1999-0502 METASPLOIT ruby SCANNER
Unix - Info Disclosure
A Unix account has a default, null, blank, or missing password.
CVE-2014-4936 METASPLOIT ruby WORKING POC
Malwarebytes Anti-Malware <2.0.3 & MBAE <1.04.1.1012 - RCE
The upgrade functionality in Malwarebytes Anti-Malware (MBAM) consumer before 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and earlier allow man-in-the-middle attackers to execute arbitrary code by spoofing the update server and uploading an executable.
CVE-2016-10372 METASPLOIT CRITICAL ruby WORKING POC
EIR D1000 Modem Firmware - Access Control
The Eir D1000 modem does not properly restrict the TR-064 protocol, which allows remote attackers to execute arbitrary commands via TCP port 7547, as demonstrated by opening WAN access to TCP port 80, retrieving the login password (which defaults to the Wi-Fi password), and using the NewNTPServer feature.
CVSS 9.8
CVE-2007-3280 METASPLOIT ruby WORKING POC
PostgreSQL 8.1 - RCE
The Database Link library (dblink) in PostgreSQL 8.1 implements functions via CREATE statements that map to arbitrary libraries based on the C programming language, which allows remote authenticated superusers to map and execute a function from any library, as demonstrated by using the system function in libc.so.6 to gain shell access.
CVE-2015-0936 METASPLOIT CRITICAL ruby WORKING POC
Ceragon FibeAir IP-10 - Privilege Escalation
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
CVSS 9.8
EIP-2026-119015 EXPLOITDB ruby WORKING POC
Oracle MySQL for Microsoft Windows - Payload Execution (Metasploit)
CVE-2014-4936 EXPLOITDB ruby WORKING POC
Malwarebytes Anti-Malware <2.0.3 & MBAE <1.04.1.1012 - RCE
The upgrade functionality in Malwarebytes Anti-Malware (MBAM) consumer before 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and earlier allow man-in-the-middle attackers to execute arbitrary code by spoofing the update server and uploading an executable.
CVE-2015-0936 EXPLOITDB CRITICAL ruby WORKING POC
Ceragon FibeAir IP-10 - Privilege Escalation
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
CVSS 9.8