Exploitdb Exploits

459 exploits tracked across all sources.

Sort: Activity Stars
CVE-2016-10073 EXPLOITDB HIGH bash
Vanilla Forums <2.3.1 - Info Disclosure
The from method in library/core/class.email.php in Vanilla Forums before 2.3.1 allows remote attackers to spoof the email domain in sent messages and potentially obtain sensitive information via a crafted HTTP Host header, as demonstrated by a password reset request.
by Dawid Golunski
CVSS 7.5
CVE-2016-10033 EXPLOITDB CRITICAL bash
PHPMailer Sendmail Argument Injection
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
by Dawid Golunski
CVSS 9.8
CVE-2017-7692 EXPLOITDB HIGH bash
SquirrelMail <20170427_0200-SVN - RCE
SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server. The problem is in the Deliver_SendMail.class.php with the initStream function that uses escapeshellcmd() to sanitize the sendmail command before executing it. The use of escapeshellcmd() is not correct in this case since it doesn't escape whitespaces, allowing the injection of arbitrary command parameters. The problem is in -f$envelopefrom within the sendmail command line. Hence, if the target server uses sendmail and SquirrelMail is configured to use it as a command-line program, it's possible to trick sendmail into using an attacker-provided configuration file that triggers the execution of an arbitrary command. For exploitation, the attacker must upload a sendmail.cf file as an email attachment, and inject the sendmail.cf filename with the -C option within the "Options > Personal Informations > Email Address" setting.
by Dawid Golunski
CVSS 8.8
CVE-2017-8051 EXPLOITDB CRITICAL bash
Tenable Appliance - OS Command Injection
Tenable Appliance 3.5 - 4.4.0, and possibly prior versions, contains a flaw in the simpleupload.py script in the Web UI. Through the manipulation of the tns_appliance_session_user parameter, a remote attacker can inject arbitrary commands.
by agix
CVSS 9.8
EIP-2026-104598 EXPLOITDB bash
GNS3 Mac OS-X 1.5.2 - 'ubridge' Local Privilege Escalation
by Hacker Fantastic
EIP-2026-114733 EXPLOITDB bash
Solaris 7 < 11 (SPARC/x86) - 'EXTREMEPARR' dtappgather Privilege Escalation
by Hacker Fantastic
CVE-2009-3960 EXPLOITDB MEDIUM bash
BlazeDS <3.2 - Info Disclosure
Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, allows remote attackers to obtain sensitive information via vectors that are associated with a request, and related to injected tags and external entity references in XML documents.
by Tess Sluyter
CVSS 6.5
CVE-2017-5344 EXPLOITDB CRITICAL bash VERIFIED
dotCMS <3.6.1 - SQL Injection
An issue was discovered in dotCMS through 3.6.1. The findChildrenByFilter() function which is called by the web accessible path /categoriesServlet performs string interpolation and direct SQL query execution. SQL quote escaping and a keyword blacklist were implemented in a new class, SQLUtil (main/java/com/dotmarketing/common/util/SQLUtil.java), as part of the remediation of CVE-2016-8902; however, these can be overcome in the case of the q and inode parameters to the /categoriesServlet path. Overcoming these controls permits a number of blind boolean SQL injection vectors in either parameter. The /categoriesServlet web path can be accessed remotely and without authentication in a default dotCMS deployment.
by Ben Nott
CVSS 9.8
CVE-2017-0358 EXPLOITDB HIGH bash
Debian/Ubuntu ntfs-3g Local Privilege Escalation
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
by Kristian Erik Hermansen
CVSS 7.8
EIP-2026-102862 EXPLOITDB bash VERIFIED
GNU Screen 4.5.0 - Local Privilege Escalation
by Xiphos Research Ltd
EIP-2026-102036 EXPLOITDB bash
Tenda ADSL2/2+ Modem D820R - DNS Change
by Todor Donev
EIP-2026-101920 EXPLOITDB bash
Pirelli DRG A115 v3 ADSL Router - DNS Change
by Todor Donev
EIP-2026-102037 EXPLOITDB bash
Tenda ADSL2/2+ Modem D840R - DNS Change
by Todor Donev
EIP-2026-101919 EXPLOITDB bash
Pirelli DRG A115 ADSL Router - DNS Change
by Todor Donev
CVE-2016-10033 EXPLOITDB CRITICAL bash VERIFIED
PHPMailer Sendmail Argument Injection
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
by Dawid Golunski
CVSS 9.8
EIP-2026-103027 EXPLOITDB bash
Vesta Control Panel 0.9.8-16 - Local Privilege Escalation
by Jaka Hudoklin
CVE-2016-8972 EXPLOITDB HIGH bash
IBM AIX <7.3 - Privilege Escalation
IBM AIX 6.1, 7.1, and 7.2 could allow a local user to gain root privileges using a specially crafted command within the bellmail client. IBM APARs: IV91006, IV91007, IV91008, IV91010, IV91011.
by Hector X. Monsegur
CVSS 7.8
CVE-2016-9566 EXPLOITDB HIGH bash VERIFIED
Nagios < 4.2.3 - Symlink Following
base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file. NOTE: this can be leveraged by remote attackers using CVE-2016-9565.
by Dawid Golunski
CVSS 7.8
CVE-2016-8641 EXPLOITDB MEDIUM bash VERIFIED
Nagios 4.2.x - Privilege Escalation
A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.
by Vincent Malguy
CVSS 6.7
CVE-2016-1247 EXPLOITDB HIGH bash
nginx <1.6.2-5+deb8u3 - Privilege Escalation
The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.
by Dawid Golunski
CVSS 7.8
CVE-2025-34048 EXPLOITDB HIGH bash
D-Link DSL-2730U/2750U/2750E - Path Traversal
A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.
by Todor Donev
EIP-2026-101409 EXPLOITDB bash
PLANET ADSL Router AND-4101 - Remote File Disclosure
by Todor Donev
EIP-2026-101384 EXPLOITDB bash
Netgear WNR500/WNR612v3/JNR1010/JNR2010 ADSL Router - (Authenticated) Remote File Disclosure
by Todor Donev
EIP-2026-101379 EXPLOITDB bash
Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure
by Todor Donev
EIP-2026-101368 EXPLOITDB bash
MOVISTAR BHS_RTA ADSL Router - Remote File Disclosure
by Todor Donev