Exploitdb Exploits
4,733 exploits tracked across all sources.
HP Data Protector - Improper Input Validation
The client in HP Data Protector allows remote attackers to execute arbitrary programs via an EXEC_SETUP command that references a UNC share pathname.
by fdiskyou
HP Data Protector - Improper Input Validation
The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
by fdiskyou
Lumension Security Lumension Device Control 4.x - Memory Corruption
by Andy Davis
Microsoft Windows Vista/2008 - 'nsiproxy.sys' Local Kernel Denial of Service
by Lufeng Li
Sonique 1.96 - '.m3u' Local Buffer Overflow
by sinfulsecurity
CoolPlayer Portable 2.19.2 - Local Buffer Overflow
by sinfulsecurity
phpWebSite 1.7.1 - 'upload.php' Arbitrary File Upload
by AutoSec Tools
Getsimple CMS 3.0 - 'set' Local File Inclusion
by AutoSec Tools
SPlayer <3.7 - Buffer Overflow
SPlayer version 3.7 and earlier is vulnerable to a stack-based buffer overflow when processing HTTP responses containing an overly long Content-Type header. The vulnerability occurs due to improper bounds checking on the header value, allowing an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code. Exploitation requires the victim to open a media file that triggers an HTTP request to a malicious server, which responds with a crafted Content-Type header.
by xsploitedsec
sipdroid 2.2 - SIP INVITE Response User Enumeration
by Anibal Vaz Marques
Microsoft Excel - Memory Corruption
Stack-based buffer overflow in Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via vectors related to an axis properties record, and improper incrementing of an array index, aka "Excel Array Indexing Vulnerability."
by webDEViL
Subtitle Processor 7.7.1 - Buffer Overflow
Subtitle Processor 7.7.1 contains a buffer overflow vulnerability in its .m3u file parser. When a crafted playlist file is opened, the application converts input to Unicode and copies it to a fixed-size stack buffer without proper bounds checking. This allows an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code.
by Brandon Murphy
AT-TFTP Server 1.8 - 'Read' Request Remote Denial of Service
by Antu Sanadi
LightNEasy 3.2.3 - 'userhandle' Cookie SQL Injection
by AutoSec Tools
Wireshark <1.4.5 - Buffer Overflow
Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
by sickness
PlaylistMaker 1.5 - '.txt' Local Buffer Overflow
by C4SS!0 G0M3S
TOTVS ERP Microsiga Protheus 8/10 - Memory Corruption (Denial of Service)
by waKKu
Cisco Security Agent - Code Injection
The Management Console (webagent.exe) in Cisco Security Agent 5.1, 5.2, and 6.0 before 6.0.2.145 allows remote attackers to create arbitrary files and execute arbitrary code via unspecified parameters in a crafted st_upload request.
by Gerry Eisenhaur
Wordtrainer 3.0 - '.ord' Local Buffer Overflow
by C4SS!0 G0M3S
IrfanView 4.28 - '.ICO' Without Transparent Colour Denial of Service / Remote Denial of Service
by BraniX
IrfanView 4.28 - '.ICO' With Transparent Colour Denial of Service / Remote Denial of Service
by BraniX
Joomla! Component com_virtuemart 1.1.7 - Blind SQL Injection
by TecR0c & mr_me
By Source