Exploitdb Exploits

4,724 exploits tracked across all sources.

Sort: Activity Stars
CVE-2020-36963 EXPLOITDB HIGH python
Intelbras Router RF 301K <1.1.2 - Auth Bypass
Intelbras Router RF 301K firmware version 1.1.2 contains an authentication bypass vulnerability that allows unauthenticated attackers to download router configuration files. Attackers can send a specific HTTP GET request to /cgi-bin/DownloadCfg/RouterCfm.cfg to retrieve sensitive router configuration without authentication.
by Kaio Amaral
CVSS 7.5
CVE-2020-28993 EXPLOITDB HIGH python
ATX Minicmts200a Firmware < 2.0 - Path Traversal
A Directory Traversal vulnerability exists in ATX miniCMTS200a Broadband Gateway through 2.0 and Pico CMTS through 2.0. Successful exploitation of this vulnerability would allow an unauthenticated attacker to retrieve administrator credentials by sending a malicious POST request.
by Zagros Bingol
CVSS 7.5
CVE-2014-6287 EXPLOITDB CRITICAL python
Rejetto HTTP File Server <2.3c - RCE
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.
by Óscar Andreu
CVSS 9.8
CVE-2018-9958 EXPLOITDB HIGH python
Foxitsoftware Foxit Reader < 9.0.1.1049 - Use After Free
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Text Annotations. When setting the point attribute, the process does not properly validate the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5620.
by CrossWire
CVSS 8.8
CVE-2020-10963 EXPLOITDB HIGH python
FrozenNode Laravel-Administrator <5.0.12 - RCE
FrozenNode Laravel-Administrator through 5.0.12 allows unrestricted file upload (and consequently Remote Code Execution) via admin/tips_image/image/file_upload image upload with PHP content within a GIF image that has the .php extension. NOTE: this product is discontinued.
by Xavi Beltran
CVSS 7.2
CVE-2020-16171 EXPLOITDB MEDIUM python
Acronis Cyber Backup < 12.5 - SSRF
An issue was discovered in Acronis Cyber Backup before 12.5 Build 16342. Some API endpoints on port 9877 under /api/ams/ accept an additional custom Shard header. The value of this header is afterwards used in a separate web request issued by the application itself. This can be abused to conduct SSRF attacks against otherwise unreachable Acronis services that are bound to localhost such as the NotificationService on 127.0.0.1:30572.
by Julien Ahrens
CVSS 6.5
CVE-2012-5958 EXPLOITDB python
Libupnp < 1.6.17 - Memory Corruption
Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
by Patrik Lantz
EIP-2026-101963 EXPLOITDB python
Ruckus IoT Controller (Ruckus vRIoT) 1.5.1.0.21 - Remote Code Execution
by Emre SUREN
CVE-2020-35359 EXPLOITDB HIGH python
Pureftpd Pure-ftpd - Resource Allocation Without Limits
Pure-FTPd 1.0.48 allows remote attackers to prevent legitimate server use by making enough connections to exceed the connection limit.
by xynmaps
CVSS 7.5
CVE-2020-16602 EXPLOITDB HIGH python VERIFIED
Razer Chroma SDK < 3.12.17 - Race Condition
Razer Chroma SDK Rest Server through 3.12.17 allows remote attackers to execute arbitrary programs because there is a race condition in which a file created under "%PROGRAMDATA%\Razer Chroma\SDK\Apps" can be replaced before it is executed by the server. The attacker must have access to port 54236 for a registration step.
by Loke Hui Yi
CVSS 8.1
EIP-2026-119440 EXPLOITDB python VERIFIED
SyncBreeze 10.0.28 - 'password' Remote Buffer Overflow
by Abdessalam king
CVE-2020-36965 EXPLOITDB HIGH python VERIFIED
docPrint Pro 8.0 - Buffer Overflow
docPrint Pro 8.0 contains a local buffer overflow vulnerability in the 'Add URL' input field that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload that triggers a structured exception handler (SEH) overwrite to execute shellcode and gain remote system access.
by MasterVlad
CVSS 8.4
EIP-2026-116918 EXPLOITDB python VERIFIED
Boxoft Audio Converter 2.3.0 - '.wav' Buffer Overflow (SEH)
by Luis Martínez
EIP-2026-117300 EXPLOITDB python
IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1 - id' Field Stack Based Buffer Overflow
by Paolo Stagno
EIP-2026-116919 EXPLOITDB python VERIFIED
Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit
by stresser
CVE-2020-36969 EXPLOITDB HIGH python
M/Monit 3.7.4 - Privilege Escalation
M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.
by Dolev Farhi
CVSS 8.8
CVE-2020-36968 EXPLOITDB MEDIUM python
M/Monit 3.7.4 - Auth Bypass
M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
by Dolev Farhi
CVSS 6.5
EIP-2026-114698 EXPLOITDB python
Gitlab 12.9.0 - Arbitrary File Read (Authenticated)
by Jasper Rasenberg
CVE-2018-13382 EXPLOITDB CRITICAL python
Fortinet Fortiproxy < 1.2.9 - Incorrect Authorization
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
by Ricardo Longatto
CVSS 9.1
CVE-2020-25988 EXPLOITDB MEDIUM python
Genexis Platinum 4410 Firmware - Cleartext Transmission
UPNP Service listening on port 5555 in Genexis Platinum 4410 Router V2.1 (P4410-V2–1.34H) has an action 'X_GetAccess' which leaks the credentials of 'admin', provided that the attacker is network adjacent.
by Nitesh Surana
CVSS 6.5
CVE-2020-24365 EXPLOITDB HIGH python
Gemtek WRTM-127ACN/WRTM-127x9 - Command Injection
An issue was discovered on Gemtek WRTM-127ACN 01.01.02.141 and WRTM-127x9 01.01.02.127 devices. The Monitor Diagnostic network page allows an authenticated attacker to execute a command directly on the target machine. Commands are executed as the root user (uid 0). (Even if a login is required, most routers are left with default credentials.)
by Gabriele Zuddas
CVSS 8.8
CVE-2020-1472 EXPLOITDB MEDIUM python
Netlogon Weak Cryptographic Authentication
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
by West Shepherd
CVSS 5.5
CVE-2019-0230 EXPLOITDB CRITICAL python
Apache Struts < 2.5.20 - Prototype Pollution
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
by West Shepherd
CVSS 9.8
CVE-2020-13151 EXPLOITDB CRITICAL python
Aerospike Database UDF Lua Code Execution
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.
by Matt S
CVSS 9.8
EIP-2026-101193 EXPLOITDB python
Cisco 7937G - DoS/Privilege Escalation
by Cody Martin