Exploitdb Exploits

4,733 exploits tracked across all sources.

Sort: Activity Stars
CVE-2016-10033 EXPLOITDB CRITICAL python
PHPMailer Sendmail Argument Injection
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
by Dawid Golunski
CVSS 9.8
CVE-2016-10045 EXPLOITDB CRITICAL python
PHPMailer <5.2.20 - RCE
The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
by Dawid Golunski
CVSS 9.8
EIP-2026-115312 EXPLOITDB python VERIFIED
FTPShell Server 6.36 - '.csv' Local Denial of Service
by sultan albalawi
EIP-2026-116587 EXPLOITDB python
XAMPP Control Panel - Denial Of Service
by hyp3rlinx
CVE-2016-0736 EXPLOITDB HIGH python
Apache HTTP Server <2.4.24 - Info Disclosure
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
by RedTeam Pentesting GmbH
CVSS 7.5
EIP-2026-102342 EXPLOITDB python VERIFIED
Java Debug Wire Protocol (JDWP) - Remote Code Execution
by IOactive
CVE-2013-6627 EXPLOITDB python VERIFIED
Google Chrome < 31.0.1650.47 - Memory Corruption
net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.
by Skylined
CVE-2014-6271 EXPLOITDB CRITICAL python VERIFIED
Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
by Hacker Fantastic
CVSS 9.8
EIP-2026-116022 EXPLOITDB python
OsiriX DICOM Viewer 8.0.1 - Memory Corruption
by LiquidWorm
EIP-2026-116021 EXPLOITDB python
Orthanc DICOM Server 1.1.0 - Memory Corruption
by LiquidWorm
EIP-2026-115076 EXPLOITDB python
ConQuest DICOM Server 1.4.17d - Stack Buffer (PoC)
by LiquidWorm
EIP-2026-104570 EXPLOITDB python
Horos 2.1.0 DICOM Medical Image Viewer - Denial of Service
by LiquidWorm
EIP-2026-102575 EXPLOITDB python
DCMTK 3.6.0 storescp - Stack Buffer Overflow
by LiquidWorm
CVE-2025-34117 EXPLOITDB CRITICAL python
Netcore/Netis <Aug 2014 - RCE
A remote code execution vulnerability exists in multiple Netcore and Netis routers models with firmware released prior to August 2014 due to the presence of an undocumented backdoor listener on UDP port 53413. Exact version boundaries remain undocumented. An unauthenticated remote attacker can send specially crafted UDP packets to execute arbitrary commands on the affected device. This backdoor uses a hardcoded authentication mechanism and accepts shell commands post-authentication. Some device models include a non-standard implementation of the `echo` command, which may affect exploitability.
by nixawk
EIP-2026-117694 EXPLOITDB python VERIFIED
Nidesoft MP3 Converter 2.6.18 - Local Buffer Overflow (SEH)
by malwrforensics
CVE-2016-9565 EXPLOITDB CRITICAL python VERIFIED
Nagios < 4.2.1 - Improper Access Control
MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796.
by Dawid Golunski
CVSS 9.8
CVE-2016-8024 EXPLOITDB HIGH python VERIFIED
Intel Security VSEL <2.0.3 - Info Disclosure
Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing.
by Andrew Fasano
CVSS 8.1
CVE-2016-8023 EXPLOITDB HIGH python VERIFIED
Intel Security VSEL <2.0.3 - Auth Bypass
Authentication bypass by assumed-immutable data vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to bypass server authentication via a crafted authentication cookie.
by Andrew Fasano
CVSS 8.1
CVE-2016-8022 EXPLOITDB HIGH python VERIFIED
Intel Security VSEL <2.0.3 - RCE
Authentication bypass by spoofing vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to execute arbitrary code or cause a denial of service via a crafted authentication cookie.
by Andrew Fasano
CVSS 7.5
CVE-2016-8021 EXPLOITDB MEDIUM python VERIFIED
Intel Security VirusScan Enterprise Linux <2.0.3 - RCE
Improper verification of cryptographic signature vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to spoof update server and execute arbitrary code via a crafted input file.
by Andrew Fasano
CVSS 5.0
CVE-2016-8020 EXPLOITDB HIGH python VERIFIED
Intel Security VirusScan Enterprise Linux <2.0.3 - Code Injection
Improper control of generation of code vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to execute arbitrary code via a crafted HTTP request parameter.
by Andrew Fasano
CVSS 8.0
CVE-2016-8019 EXPLOITDB MEDIUM python VERIFIED
Intel Security VSEL <2.0.3 - XSS
Cross-site scripting (XSS) vulnerability in attributes in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows unauthenticated remote attackers to inject arbitrary web script or HTML via a crafted user input.
by Andrew Fasano
CVSS 6.1
CVE-2016-8018 EXPLOITDB MEDIUM python VERIFIED
Intel Security VSEL <2.0.3 - CSRF
Cross-site request forgery (CSRF) vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows authenticated remote attackers to execute unauthorized commands via a crafted user input.
by Andrew Fasano
CVSS 4.3
CVE-2016-8017 EXPLOITDB MEDIUM python VERIFIED
Intel Security VSEL <2.0.3 - Code Injection
Special element injection vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows authenticated remote attackers to read files on the webserver via a crafted user input.
by Andrew Fasano
CVSS 4.1
CVE-2016-8016 EXPLOITDB LOW python VERIFIED
Intel Security VirusScan Enterprise Linux <2.0.3 - Info Disclosure
Information exposure in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows authenticated remote attackers to obtain the existence of unauthorized files on the system via a URL parameter.
by Andrew Fasano
CVSS 3.4