Exploitdb Exploits

4,733 exploits tracked across all sources.

Sort: Activity Stars
CVE-2015-1058 EXPLOITDB python
AdaptCMS 3.0.3 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in AdaptCMS 3.0.3 allow remote attackers to inject arbitrary web script or HTML via the (1) data[Category][title] parameter to admin/categories/add, (2) data[Field][title] parameter to admin/fields/ajax_fields/, (3) name property in a basicInfo JSON object to admin/tools/create_theme, (4) data[Link][link_title] parameter to admin/links/links/add, or (5) data[ForumTopic][subject] parameter to forums/off-topic/new.
by LiquidWorm
CVE-2015-1059 EXPLOITDB python
AdaptCMS 3.0.3 - Code Injection
Unrestricted file upload vulnerability in admin/files/add in AdaptCMS 3.0.3 allows remote authenticated users to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in /app/webroot/uploads.
by LiquidWorm
CVE-2014-9583 EXPLOITDB python VERIFIED
ASUS WRT - Auth Bypass
common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.
by Friedrich Postelstorfer
EIP-2026-100050 EXPLOITDB python VERIFIED
WhatsApp 2.11.476 (Android) - Remote Reboot/Crash App (Denial of Service)
by Daniel Godoy
EIP-2026-115485 EXPLOITDB python VERIFIED
jetAudio 8.1.3 Basic (mp3) - Crash (PoC)
by Drozdova Liudmila
EIP-2026-103309 EXPLOITDB python
Phase Botnet - Blind SQL Injection
by MalwareTech
CVE-2014-9456 EXPLOITDB python VERIFIED
NotePad++ 6.6.9 - Buffer Overflow
Buffer overflow in NotePad++ 6.6.9 allows remote attackers to have unspecified impact via a long Time attribute in an Event element in an XML file. NOTE: this issue was originally incorrectly mapped to CVE-2014-1004; see CVE-2014-1004 for more information.
by TaurusOmar
EIP-2026-115604 EXPLOITDB python
Mediacoder 0.8.33 build 5680 - '.m3u' Buffer Overflow (PoC) (SEH Overwrite)
by s-dz
EIP-2026-115603 EXPLOITDB python
Mediacoder 0.8.33 build 5680 - '.lst' Buffer Overflow (PoC) (SEH Overwrite)
by s-dz
EIP-2026-115475 EXPLOITDB python
jaangle 0.98i.977 - Denial of Service
by s-dz
CVE-2014-10021 EXPLOITDB python
Wpsymposiumpro WP Symposium - Unrestricted File Upload
Unrestricted file upload vulnerability in UploadHandler.php in the WP Symposium plugin 14.11 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in server/php/.
by Claudio Viviani
EIP-2026-113689 EXPLOITDB python
WordPress Plugin Download Manager 2.7.4 - Remote Code Execution
by Claudio Viviani
EIP-2026-116545 EXPLOITDB python VERIFIED
Winamp 5.666 build 3516 - Corrupted .flv Crash (PoC)
by Drozdova Liudmila
EIP-2026-115484 EXPLOITDB python VERIFIED
JetAudio 8.1.3 - '.mp4' Crash (PoC)
by Drozdova Liudmila
EIP-2026-103062 EXPLOITDB python VERIFIED
Apache James Server 2.3.2 - Remote Command Execution
by Jakub Palaczynski
CVE-2014-6324 EXPLOITDB HIGH python VERIFIED
Microsoft Windows - Privilege Escalation
The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."
by Sylvain Monne
CVSS 8.8
CVE-2014-9567 EXPLOITDB python
ProjectSend <r561 - RCE
Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.
by Fady Mohammed Osman
CVE-2014-8517 EXPLOITDB python
Apple Mac OS X - Command Injection
The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
by dash
CVE-2014-9347 EXPLOITDB python
phpMyRecipes 1.2.2 - SQL Injection
SQL injection vulnerability in dosearch.php in phpMyRecipes 1.2.2 allows remote attackers to execute arbitrary SQL commands via the words_exact parameter.
by bard
EIP-2026-114272 EXPLOITDB python
WordPress Plugin wpDataTables 1.5.3 - Arbitrary File Upload
by Claudio Viviani
CVE-2014-10029 EXPLOITDB python
Fluxbb < 1.4.11 - SQL Injection
SQL injection vulnerability in profile.php in FluxBB before 1.4.13 and 1.5.x before 1.5.7 allows remote attackers to execute arbitrary SQL commands via the req_new_email parameter.
by secthrowaway
EIP-2026-108363 EXPLOITDB python VERIFIED
Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download
by Claudio Viviani
CVE-2014-5284 EXPLOITDB python VERIFIED
Ossec < 2.8.0 - Access Control
host-deny.sh in OSSEC before 2.8.1 writes to temporary files with predictable filenames without verifying ownership, which allows local users to modify access restrictions in hosts.deny and gain root privileges by creating the temporary files before automatic IP blocking is performed.
by skynet-13
EIP-2026-104294 EXPLOITDB python VERIFIED
Joomla! Component com_hdflvplayer < 2.1.0.1 - SQL Injection
by Claudio Viviani
CVE-2014-6352 EXPLOITDB HIGH python
MS14-064 Microsoft Windows OLE Package Manager Code Execution
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object, as exploited in the wild in October 2014 with a crafted PowerPoint document.
by Abhishek Lyall
CVSS 7.8