Exploitdb Exploits

4,724 exploits tracked across all sources.

Sort: Activity Stars
CVE-2020-37040 EXPLOITDB HIGH python
Code Blocks 17.12 - Buffer Overflow
Code Blocks 17.12 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious file name with Unicode characters. Attackers can trigger the vulnerability by pasting a specially crafted payload into the file name field during project creation, potentially executing system commands like calc.exe.
by Paras Bhatia
CVSS 8.4
CVE-2020-5515 EXPLOITDB HIGH python
Gila CMS 1.11.8 - SQL Injection
Gila CMS 1.11.8 allows /admin/sql?query= SQL Injection.
by BillyV4
CVSS 7.2
CVE-2020-12712 EXPLOITDB HIGH python
SOS JobScheduler <1.13 - Info Disclosure
A vulnerability based on insecure user/password encryption in the JOE (job editor) component of SOS JobScheduler 1.12 and 1.13 allows attackers to decrypt the user/password that is optionally stored with a user's profile.
by Sander Ubink
CVSS 7.5
EIP-2026-101868 EXPLOITDB python
Netgear R7000 Router - Remote Code Execution
by grimm-co
EIP-2026-104437 EXPLOITDB python
SmarterMail 16 - Arbitrary File Upload
by vvhack.org
CVE-2020-37042 EXPLOITDB HIGH python
Frigate Professional 3.36.0.9 - Buffer Overflow
Frigate Professional 3.36.0.9 contains a local buffer overflow vulnerability in the 'Find Computer' feature that allows attackers to execute arbitrary code by overflowing the computer name input field. Attackers can craft a malicious payload that triggers a buffer overflow, enabling code execution and launching calculator as a proof of concept.
by Paras Bhatia
CVSS 8.4
CVE-2020-37043 EXPLOITDB CRITICAL python
10-Strike Bandwidth Monitor 3.9 - Buffer Overflow
10-Strike Bandwidth Monitor 3.9 contains a buffer overflow vulnerability that allows attackers to bypass SafeSEH, ASLR, and DEP protections through carefully crafted input. Attackers can exploit the vulnerability by sending a malicious payload to the application's registration key input, enabling remote code execution and launching arbitrary system commands.
by boku
CVSS 9.8
EIP-2026-103921 EXPLOITDB python
HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC)
by hyp3rlinx
CVE-2019-16113 EXPLOITDB HIGH python
Bludit 3.9.2 - RCE
Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
by Luis Vacacas
CVSS 8.8
CVE-2020-37050 EXPLOITDB CRITICAL python
Quick Player 1.3 - Buffer Overflow
Quick Player 1.3 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious .m3l file with carefully constructed payload. Attackers can trigger the vulnerability by loading a specially crafted file through the application's file loading mechanism, potentially enabling remote code execution.
by Felipe Winsnes
CVSS 9.8
CVE-2020-37049 EXPLOITDB HIGH python
Frigate 3.36.0.9 - Buffer Overflow
Frigate 3.36.0.9 contains a local buffer overflow vulnerability in the Command Line input field that allows attackers to execute arbitrary code. Attackers can craft a malicious payload to overflow the buffer, bypass DEP, and execute commands like launching calc.exe through a specially crafted input sequence.
by Paras Bhatia
CVSS 8.4
CVE-2020-37051 EXPLOITDB HIGH python
Online-Exam-System 2015 - SQL Injection
Online-Exam-System 2015 contains a time-based blind SQL injection vulnerability in the feedback form that allows attackers to extract database password hashes. Attackers can exploit the 'feed.php' endpoint by crafting malicious payload requests that use time delays to systematically enumerate user password characters.
by Gus Ralph
CVSS 8.2
CVE-2020-37053 EXPLOITDB HIGH python
Navigate CMS 2.8.7 - Authenticated SQL Injection
Navigate CMS 2.8.7 contains an authenticated SQL injection vulnerability that allows attackers to leak database information by manipulating the 'sidx' parameter in comments. Attackers can exploit the vulnerability to extract user activation keys by using time-based blind SQL injection techniques, potentially enabling password reset for administrative accounts.
by Gus Ralph
CVSS 7.1
CVE-2020-37052 EXPLOITDB CRITICAL python
AirControl 1.4.2 - RCE
AirControl 1.4.2 contains a pre-authentication remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through malicious Java expression injection. Attackers can exploit the /.seam endpoint by crafting a specially constructed URL with embedded Java expressions to run commands with the application's system privileges.
by 0xd0ff9
CVSS 9.8
CVE-2020-36910 EXPLOITDB HIGH python
Cayin Signage Media Player 3.0 - Command Injection
Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the 'NTP_Server_IP' parameter with default credentials to execute arbitrary shell commands as root.
by LiquidWorm
CVSS 8.8
EIP-2026-102431 EXPLOITDB python
VMWAre vCloud Director 9.7.0.15498291 - Remote Code Execution
by Tomas Melicher
CVE-2020-0796 EXPLOITDB CRITICAL python
Microsoft Windows 10 1903 - Memory Corruption
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
by chompie1337
CVSS 10.0
CVE-2020-3956 EXPLOITDB HIGH python
Vmware Vcloud Director < 9.5.0.6 - Remote Code Execution
VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traffic to VMware Cloud Director which may lead to arbitrary remote code execution. This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access.
by aaronsvk
CVSS 8.8
CVE-2020-13693 EXPLOITDB CRITICAL python
bbPress <2.6.5 - Privilege Escalation
An unauthenticated privilege-escalation issue exists in the bbPress plugin before 2.6.5 for WordPress when New User Registration is enabled.
by Raphael Karger
CVSS 9.8
CVE-2020-13448 EXPLOITDB HIGH python
QuickBox <2.5.5-2.1.8 - Command Injection
QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8 allows an authenticated remote attacker to execute code on the server via command injection in the servicestart parameter.
by s1gh
CVSS 8.8
CVE-2020-37056 EXPLOITDB CRITICAL python
Crystal Shard http-protection 0.2.0 - SSRF
Crystal Shard http-protection 0.2.0 contains an IP spoofing vulnerability that allows attackers to bypass protection middleware by manipulating request headers. Attackers can hardcode consistent IP values across X-Forwarded-For, X-Client-IP, and X-Real-IP headers to circumvent security checks and gain unauthorized access.
by Halis Duraki
CVSS 9.8
EIP-2026-111621 EXPLOITDB python
QNAP QTS and Photo Station 6.0.3 - Remote Command Execution
by Th3GundY
CVE-2020-37065 EXPLOITDB CRITICAL python
StreamRipper32 <2.6 - Buffer Overflow
StreamRipper32 version 2.6 contains a buffer overflow vulnerability in the Station/Song Section that allows attackers to overwrite memory by manipulating the SongPattern input. Attackers can craft a malicious payload exceeding 256 bytes to potentially execute arbitrary code and compromise the application.
by Andy Bowden
CVSS 9.8
EIP-2026-110294 EXPLOITDB python
OpenEMR 5.0.1 - Remote Code Execution (1)
by Musyoka Ian
CVE-2020-11108 EXPLOITDB HIGH python VERIFIED
Pi-Hole heisenbergCompensator Blocklist OS Command Execution
The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to upload arbitrary files. This can be abused for Remote Code Execution by writing to a PHP file in the web directory. (Also, it can be used in conjunction with the sudo rule for the www-data user to escalate privileges to root.) The code error is in gravity_DownloadBlocklistFromUrl in gravity.sh.
by Photubias
CVSS 8.8