Exploitdb Exploits

2,012 exploits tracked across all sources.

Sort: Activity Stars
CVE-2016-7286 EXPLOITDB HIGH html VERIFIED
Microsoft Edge - Memory Corruption
The scripting engines in Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7288, CVE-2016-7296, and CVE-2016-7297.
by Google Security Research
CVSS 7.5
CVE-2016-7287 EXPLOITDB HIGH html VERIFIED
Microsoft Edge - Memory Corruption
The scripting engines in Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
by Google Security Research
CVSS 7.5
CVE-2014-1785 EXPLOITDB html VERIFIED
Microsoft Internet Explorer 11 - Memory Corruption
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769, CVE-2014-1782, CVE-2014-2753, CVE-2014-2755, CVE-2014-2760, CVE-2014-2761, CVE-2014-2772, and CVE-2014-2776.
by Skylined
CVE-2009-2477 EXPLOITDB html VERIFIED
Mozilla Firefox <3.5.1 - RCE
js/src/jstracer.cpp in the Just-in-time (JIT) JavaScript compiler (aka TraceMonkey) in Mozilla Firefox 3.5 before 3.5.1 allows remote attackers to execute arbitrary code via certain use of the escape function that triggers access to uninitialized memory locations, as originally demonstrated by a document containing P and FONT elements.
by Hacker Fantastic
CVE-2013-0090 EXPLOITDB HIGH html VERIFIED
Microsoft Internet Explorer - Resource Management Error
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
by Skylined
CVSS 8.8
EIP-2026-113994 EXPLOITDB html
WordPress Plugin Quiz And Survey Master 4.5.4/4.7.8 - Cross-Site Request Forgery
by dxw
EIP-2026-115734 EXPLOITDB html
Microsoft Internet Explorer 9 - MSHTML CMarkup::Reload­In­Compat­View Use-After-Free
by Skylined
CVE-2013-3143 EXPLOITDB html VERIFIED
Microsoft Internet Explorer <10 - Code Injection
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
by Skylined
CVE-2013-3111 EXPLOITDB html VERIFIED
Microsoft Internet Explorer <11 - Code Injection
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
by Skylined
EIP-2026-113912 EXPLOITDB html
WordPress Plugin Multisite Post Duplicator 0.9.5.1 - Cross-Site Request Forgery
by dxw
EIP-2026-115733 EXPLOITDB html
Microsoft Internet Explorer 9 - MSHTML CElement::Has­Flag Memory Corruption
by Skylined
CVE-2013-1306 EXPLOITDB html VERIFIED
Microsoft Internet Explorer 9 - RCE
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1313.
by Skylined
CVE-2013-1309 EXPLOITDB html VERIFIED
Microsoft Internet Explorer <11 - Use After Free
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
by Skylined
CVE-2017-5633 EXPLOITDB HIGH html
D-link Di-524 Firmware - CSRF
Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs.
by Felipe Soares de Souza
CVSS 8.0
CVE-2015-1730 EXPLOITDB html VERIFIED
Microsoft Internet Explorer - Resource Management Error
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
by Skylined
CVE-2013-0019 EXPLOITDB html VERIFIED
Microsoft Internet Explorer - Resource Management Error
Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
by Skylined
CVE-2016-7241 EXPLOITDB HIGH html VERIFIED
Microsoft Edge - Memory Corruption
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
by Google Security Research
CVSS 7.5
CVE-2015-0050 EXPLOITDB html VERIFIED
Microsoft Internet Explorer - Resource Management Error
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-8967 and CVE-2015-0044.
by Skylined
EIP-2026-115678 EXPLOITDB html
Microsoft Internet Explorer 11 - MSHTML 'CGenerated­Content::Has­Generated­SVGMarker' Type Confusion
by Skylined
CVE-2013-3120 EXPLOITDB html VERIFIED
Microsoft Internet Explorer 10 - Memory Corruption
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
by Skylined
CVE-2016-6754 EXPLOITDB HIGH html
Google Android < 6.0.1 - Injection
A remote code execution vulnerability in Webview in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-11-05 could enable a remote attacker to execute arbitrary code when the user is navigating to a website. This issue is rated as High due to the possibility of remote code execution in an unprivileged process. Android ID: A-31217937.
by Guang Gong
CVSS 8.8
EIP-2026-115727 EXPLOITDB html
Microsoft Internet Explorer 8 - MSHTML 'Ptls5::Ls­Find­Span­Visual­Boundaries' Memory Corruption
by Skylined
CVE-2015-2482 EXPLOITDB html VERIFIED
Microsoft Jscript - Memory Corruption
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted replace operation with a JavaScript regular expression, aka "Scripting Engine Memory Corruption Vulnerability."
by Skylined
CVE-2016-7202 EXPLOITDB HIGH html VERIFIED
Microsoft Edge < 1.2.2 - Memory Corruption
The scripting engines in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," as demonstrated by the Chakra JavaScript engine, a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
by Security-Assessment.com
CVSS 7.5
CVE-2016-3247 EXPLOITDB HIGH html VERIFIED
Microsoft Edge - Denial of Service
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
by Skylined
CVSS 7.5