Exploitdb Exploits

4,759 exploits tracked across all sources.

Sort: Activity Stars
CVE-2010-0013 EXPLOITDB HIGH python VERIFIED
Adium < 11.2 - Path Traversal
Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
by Mathieu GASPARD
CVSS 7.5
CVE-2010-0249 EXPLOITDB HIGH python VERIFIED
Microsoft Internet Explorer - Use After Free
Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka "HTML Object Memory Corruption Vulnerability."
by Ahmed Obied
CVSS 8.8
EIP-2026-117251 EXPLOITDB python VERIFIED
Google SketchUp 7.1.6087 - 'lib3ds' 3DS Importer Memory Corruption
by mr_me
CVE-2010-2004 EXPLOITDB python VERIFIED
Bsplayer Bs.player - Memory Corruption
Stack-based buffer overflow in BS.Global BS.Player 2.51 Build 1022 Free, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via the Skin parameter in the Options section of a skins file (.bsi), a different vulnerability than CVE-2009-1068.
by Dz_attacker
CVE-2010-2004 EXPLOITDB python VERIFIED
Bsplayer Bs.player - Memory Corruption
Stack-based buffer overflow in BS.Global BS.Player 2.51 Build 1022 Free, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via the Skin parameter in the Options section of a skins file (.bsi), a different vulnerability than CVE-2009-1068.
by Mert SARICA
CVE-2010-0359 EXPLOITDB python VERIFIED
Zeus Web Server - Memory Corruption
Buffer overflow in the SSLv2 support in Zeus Web Server before 4.3r5 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long string in an invalid Client Hello message.
by Intevydis
CVE-2010-0071 EXPLOITDB python VERIFIED
Oracle Database <11.1.0.7 - Info Disclosure
Unspecified vulnerability in the Listener component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
by Dennis Yurichev
EIP-2026-102172 EXPLOITDB python VERIFIED
iOS Udisk FTP Basic Edition - Remote Denial of Service
by mr_me
CVE-2010-0313 EXPLOITDB python VERIFIED
SUN Java System Directory Server - Denial of Service
The core_get_proxyauth_dn function in ns-slapd in Sun Java System Directory Server Enterprise Edition 7.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted LDAP Search Request message.
by Intevydis
EIP-2026-116432 EXPLOITDB python VERIFIED
ttplayer 5.6Beta3 - Denial of Service (PoC)
by t-bag YDteam
EIP-2026-117812 EXPLOITDB python VERIFIED
Quick Player 1.2 - Unicode Buffer Overflow (2)
by sinn3r
EIP-2026-103668 EXPLOITDB python VERIFIED
Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC)
by Evgeny Legerov
EIP-2026-118316 EXPLOITDB python VERIFIED
BigAnt Server 2.52 - Remote Buffer Overflow (2)
by DouBle_Zer0
EIP-2026-118960 EXPLOITDB python VERIFIED
NetTransport Download Manager 2.90.510 - Remote Overflow (SEH)
by Lincoln
EIP-2026-116243 EXPLOITDB python VERIFIED
SimplePlayer 0.2 - '.wav' Overflow Denial of Service
by mr_me
EIP-2026-118785 EXPLOITDB python VERIFIED
Microsoft IIS - ASP Multiple Extensions Security Bypass 5.x/6.x Vulnerabilities
by emgent
EIP-2026-117811 EXPLOITDB python VERIFIED
Quick Player 1.2 - Unicode Buffer Overflow (1)
by mr_me
EIP-2026-118317 EXPLOITDB python VERIFIED
BigAnt Server 2.52 - Remote Overflow (SEH)
by Lincoln
EIP-2026-117934 EXPLOITDB python VERIFIED
Soritong 1.0 - Universal Buffer Overflow
by jacky
EIP-2026-117608 EXPLOITDB python VERIFIED
Mini-stream Ripper 3.0.1.1 - '.pls' Universal Buffer Overflow
by jacky
CVE-2009-5109 EXPLOITDB python VERIFIED
Mini-stream Ripper - Memory Corruption
Stack-based buffer overflow in Mini-Stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long entry in a .pls file.
by dijital1
EIP-2026-117850 EXPLOITDB python VERIFIED
ReGet Deluxe 5.2 (build 330) - Local Stack Overflow
by Encrypt3d.M!nd
EIP-2026-117102 EXPLOITDB python VERIFIED
Easy RM to MP3 2.7.3.700 - Local Buffer Overflow
by dijital1
CVE-2009-4324 EXPLOITDB HIGH python VERIFIED
Adobe Reader/Acrobat <9.3-8.2 - RCE
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
by Ahmed Obied
CVSS 7.8
CVE-2009-3555 EXPLOITDB python VERIFIED
Apache HTTP Server < 2.2.14 - Improper Certificate Validation
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
by RedTeam Pentesting