Exploitdb Exploits

4,733 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-101327 EXPLOITDB python
iphone mydocs 2.7 - Directory Traversal
by Khashayar Fereidani
EIP-2026-101325 EXPLOITDB python
iphone ifile 2.0 - Directory Traversal
by Khashayar Fereidani
EIP-2026-101323 EXPLOITDB python
iphone folders 2.5 - Directory Traversal
by Khashayar Fereidani
EIP-2026-116478 EXPLOITDB python VERIFIED
Victory FTP Server 5.0 - Denial of Service
by C4SS!0 G0M3S
EIP-2026-115213 EXPLOITDB python VERIFIED
Elecard MPEG Player 5.7 - Local Buffer Overflow (PoC) (SEH)
by badc0re
EIP-2026-111552 EXPLOITDB python
ProQuiz 2.0.0b - Arbitrary File Upload
by AutoSec Tools
EIP-2026-116554 EXPLOITDB python VERIFIED
WinMerge 2.12.4 - Project File Handling Stack Overflow
by LiquidWorm
EIP-2026-108033 EXPLOITDB python VERIFIED
JAKCMS 2.01 RC1 - Blind SQL Injection
by mr_me
EIP-2026-108032 EXPLOITDB python VERIFIED
JAKCMS 2.01 - Code Execution
by mr_me
EIP-2026-115018 EXPLOITDB python VERIFIED
BWMeter 5.4.0 - '.csv' Denial of Service
by b0telh0
EIP-2026-118233 EXPLOITDB python VERIFIED
ActFax Server FTP 4.25 Build 0221 (2010-02-11) - (Authenticated) Remote Buffer Overflow
by chap0
EIP-2026-117728 EXPLOITDB python VERIFIED
Oracle 10/11g - 'exp.exe?file' Local Buffer Overflow
by mr_me
EIP-2026-116852 EXPLOITDB python VERIFIED
AutoPlay 1.33 (autoplay.ini) - Local Buffer Overflow (SEH)
by badc0re
CVE-2011-1055 EXPLOITDB python VERIFIED
Lingxia273 Lingxia I.c.e Cms - SQL Injection
SQL injection vulnerability in api/ice_media.cfc in Lingxia I.C.E CMS 1.0 allows remote attackers to execute arbitrary SQL commands via the session.user_id parameter to media.cfm.
by mr_me
CVE-2011-0654 EXPLOITDB python VERIFIED
Microsoft Windows 2003 Server - Memory Corruption
Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information.
by Cupidon-3005
EIP-2026-117633 EXPLOITDB python VERIFIED
MoviePlay 4.82 - '.lst' Local Buffer Overflow
by sickness
EIP-2026-102516 EXPLOITDB python VERIFIED
Openedit 5.1294 - Remote Code Execution
by mr_me
EIP-2026-116612 EXPLOITDB python VERIFIED
XM Easy Personal FTP Server 5.8.0 - 'TYPE' Denial of Service
by Houssam Sahli
EIP-2026-113270 EXPLOITDB python VERIFIED
webERP 4.0.1 - 'InputSerialItemsFile.php' Arbitrary File Upload
by AutoSec Tools
EIP-2026-104309 EXPLOITDB python
LocatePC 1.05 (Ligatt Version + Others) - SQL Injection
by anonymous
EIP-2026-118189 EXPLOITDB python VERIFIED
xRadio 0.95b - '.xrl' Local Buffer Overflow (SEH)
by b0telh0
EIP-2026-115382 EXPLOITDB python VERIFIED
Hanso Player 1.4.0.0 - 'Skinfile' Buffer Overflow (Denial of Service)
by badc0re
EIP-2026-115377 EXPLOITDB python
Hanso Converter 1.1.0 - BufferOverflow Denial of Service
by badc0re
CVE-2011-10027 EXPLOITDB HIGH python VERIFIED
AOL Desktop 9.6 - Buffer Overflow
AOL Desktop 9.6 contains a buffer overflow vulnerability in its Tool\rich.rct component when parsing .rtx files. By embedding an overly long string in a hyperlink tag, an attacker can trigger a stack-based buffer overflow due to the use of unsafe strcpy operations. This allows remote attackers to execute arbitrary code when a victim opens a malicious .rtx file. AOL Desktop is end-of-life and no longer supported. Users are encouraged to migrate to AOL Desktop Gold or alternative platforms.
by sickness
CVE-2011-10010 EXPLOITDB CRITICAL python VERIFIED
QuickShare File Server 1.2.1 - Path Traversal
QuickShare File Server 1.2.1 contains a path traversal vulnerability in its FTP service due to improper sanitation of user-supplied file paths. Authenticated users can exploit this flaw by submitting crafted sequences to access or write files outside the intended virtual directory. When the "Writable" option is enabled (default during account creation), this allows attackers to upload arbitrary files to privileged locations such as system32, enabling remote code execution via MOF injection or executable placement.
by modpr0be