Exploitdb Exploits

2,814 exploits tracked across all sources.

Sort: Activity Stars
CVE-2010-1301 EXPLOITDB perl VERIFIED
Centreon 2.1.5 - SQL Injection
SQL injection vulnerability in main.php in Centreon 2.1.5 allows remote attackers to execute arbitrary SQL commands via the host_id parameter.
by Jonathan Salwan
EIP-2026-116590 EXPLOITDB perl VERIFIED
Xilisoft BlackBerry Ring Tone Maker - '.wma' Local Crash
by anonymous
CVE-2008-1425 EXPLOITDB perl VERIFIED
Easy-Clanpage 2.2 - SQL Injection
SQL injection vulnerability in index.php in the gallery module in Easy-Clanpage 2.2 allows remote attackers to execute arbitrary SQL commands via the id parameter in a kate action.
by Easy Laster
CVE-2009-1642 EXPLOITDB perl VERIFIED
Mini-stream TO Mp3 Converter - Memory Corruption
Multiple stack-based buffer overflows in Mini-stream ASX to MP3 Converter 3.0.0.7 allow remote attackers to execute arbitrary code via (1) a long rtsp URL in a .ram file and (2) a long string in the HREF attribute of a REF element in a .asx file. NOTE: the latter was also subsequently reported in "prior to 3.1.3.7."
by mat
EIP-2026-116825 EXPLOITDB perl VERIFIED
ASX to MP3 Converter 3.0.0.100 - '.pls' Universal Stack Overflow
by mat
EIP-2026-117611 EXPLOITDB perl VERIFIED
Mini-stream RM-MP3 Converter 3.0.0.7 - '.pls' Universal Stack Buffer Overflow
by mat
EIP-2026-102750 EXPLOITDB perl
tPop3d 1.5.3 - Denial of Service
by OrderZero
EIP-2026-116250 EXPLOITDB perl VERIFIED
Smart PC Recorder 4.8 - '.mp3' Local Crash (PoC)
by chap0
EIP-2026-110929 EXPLOITDB perl VERIFIED
PHPAuthent 0.2.1 - 'useradd.php' Multiple HTML Injection Vulnerabilities
by Yoyahack
EIP-2026-118499 EXPLOITDB perl VERIFIED
eDisplay Personal FTP Server 1.0.0 - (Authenticated) Multiple Stack Buffer Overflows (1)
by corelanc0d3r
EIP-2026-116178 EXPLOITDB perl VERIFIED
Remote Help HTTP 0.0.7 - GET Format String Denial of Service
by Rick2600
CVE-2010-20123 EXPLOITDB HIGH perl VERIFIED
Steinberg MyMP3Player <3.0.0.67 - Buffer Overflow
Steinberg MyMP3Player version 3.0 (build 3.0.0.67) is vulnerable to a stack-based buffer overflow when parsing .m3u playlist files. The application fails to properly validate the length of input data within the playlist, allowing a specially crafted file to overwrite critical memory structures and execute arbitrary code. This vulnerability can be exploited locally by convincing a user to open a malicious .m3u file.
by n3w7u
EIP-2026-103581 EXPLOITDB perl
mplayer 4.4.1 - Null Pointer Dereference (PoC)
by Pietro Oliva
EIP-2026-118115 EXPLOITDB perl VERIFIED
Windisc 1.3 - Local Stack Buffer Overflow
by Rick2600
EIP-2026-117817 EXPLOITDB perl VERIFIED
QuickZip 4.60.019 (Windows XP SP3) - Local Stack Buffer Overflow
by corelanc0d3r
EIP-2026-103457 EXPLOITDB perl
Embedthis Appweb 3.1.2 - Remote Denial of Service
by chr1x
EIP-2026-115596 EXPLOITDB perl VERIFIED
Media Player 6.4.9.1 with K-Lite Codec Pack - '.avi' File Crash (Denial of Service)
by En|gma7
EIP-2026-115340 EXPLOITDB perl VERIFIED
GOM Player 2.1.21 - '.avi' Denial of Service
by En|gma7
EIP-2026-100915 EXPLOITDB perl VERIFIED
Trouble Ticket Express 3.01 - Remote Code Execution / Directory Traversal
by zombiefx
EIP-2026-118192 EXPLOITDB perl VERIFIED
Yahoo Player 1.0 - '.m3u' Local Buffer Overflow
by Bombard
EIP-2026-107936 EXPLOITDB perl
Invision Power Board Currency Mod 1.3 - 'edit' SQL Injection
by Yakir Wizman
EIP-2026-115403 EXPLOITDB perl VERIFIED
httpdx 1.5.3 - '.png' File Handling Remote Denial of Service
by Jonathan Salwan
EIP-2026-118191 EXPLOITDB perl VERIFIED
Yahoo Player 1.0 - '.m3u' / '.pls' / '.ypl' Local Buffer Overflow (SEH)
by Mr.tro0oqy
CVE-2010-0948 EXPLOITDB perl VERIFIED
Bigforum 4.5 - SQL Injection
SQL injection vulnerability in profil.php in Bigforum 4.5, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter.
by Ctacok
CVE-2010-0952 EXPLOITDB perl
OneCMS 2.5 - SQL Injection
SQL injection vulnerability in index.php in OneCMS 2.5, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the user parameter in an elite action.
by Ctacok & .:[melkiy]: