Exploitdb Exploits

4,724 exploits tracked across all sources.

Sort: Activity Stars
CVE-2020-37187 EXPLOITDB HIGH python VERIFIED
SpotDialup 1.6.7 - DoS
SpotDialup 1.6.7 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Name' field to trigger an application crash.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37186 EXPLOITDB CRITICAL python
Chevereto 3.13.4 Core - RCE
Chevereto 3.13.4 Core contains a remote code execution vulnerability that allows attackers to inject malicious code during database configuration installation. Attackers can manipulate the database table prefix parameter to write a PHP shell file and execute arbitrary system commands through a crafted POST request.
by Jinny Ramsmark
CVSS 9.8
CVE-2020-37185 EXPLOITDB HIGH python
Backup Key Recovery <2.2.5 - DoS
Backup Key Recovery 2.2.5 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the 'Name' input field. Attackers can generate a 1000-character payload and paste it into the registration name field to trigger an application crash.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37184 EXPLOITDB CRITICAL python
Allok Video Converter <4.6.1217 - RCE
Allok Video Converter 4.6.1217 contains a stack overflow vulnerability in the License Name input field that allows attackers to execute arbitrary code. Attackers can craft a specially designed payload to overwrite SEH handlers and execute system commands by injecting malicious bytecode into the input field.
by antonio
CVSS 9.8
CVE-2020-37183 EXPLOITDB CRITICAL python
Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Buffer Overflow
Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload in the License Name input field to trigger a buffer overflow and execute system commands like calc.exe.
by antonio
CVSS 9.8
EIP-2026-117557 EXPLOITDB python
Microsoft Windows 10 build 1809 - Local Privilege Escalation (UAC Bypass)
by Nassim Asrir
CVE-2019-1978 EXPLOITDB MEDIUM python
Cisco Firepower Services Software For Asa - Improper Input Validation
A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems that would otherwise be blocked.
by TrustedSec
CVSS 5.8
CVE-2020-6756 EXPLOITDB CRITICAL python
Rasilient Pixelstor 5000 Firmware - OS Command Injection
languageOptions.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows unauthenticated attackers to remotely execute code via the lang parameter.
by .:UND3R:.
CVSS 9.8
EIP-2026-110452 EXPLOITDB python VERIFIED
Pandora 7.0NG - Remote Code Execution
by Askar
CVE-2020-37193 EXPLOITDB HIGH python VERIFIED
ZIP Password Recovery 2.30 - DoS
ZIP Password Recovery 2.30 contains a denial of service vulnerability that allows attackers to crash the application by providing maliciously crafted input. Attackers can create a specially prepared text file with specific characters to trigger an application crash when selecting a ZIP file.
by ZwX
CVSS 7.5
CVE-2019-2729 EXPLOITDB CRITICAL python
Oracle Communications Diameter Signal... - Improper Access Control
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
by james
CVSS 9.8
CVE-2020-10224 EXPLOITDB CRITICAL python VERIFIED
Phpgurukul Online Book Store - Unrestricted File Upload
An unauthenticated file upload vulnerability has been identified in admin_add.php in PHPGurukul Online Book Store 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
by Tib3rius
CVSS 9.8
CVE-2017-3623 EXPLOITDB CRITICAL python
Solaris - RCE
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel RPC). For supported versions that are affected see note. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3623 is assigned for "Ebbisland". Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue. CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
by hantwister
CVSS 10.0
CVE-2020-10225 EXPLOITDB CRITICAL python VERIFIED
Phpgurukul Job Portal - Unrestricted File Upload
An unauthenticated file upload vulnerability has been identified in admin/gallery.php in PHPGurukul Job Portal 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
by Tib3rius
CVSS 9.8
EIP-2026-106107 EXPLOITDB python VERIFIED
Complaint Management System 4.0 - Remote Code Execution
by Metin Yunus Kandemir
CVE-2020-37213 EXPLOITDB HIGH python VERIFIED
TextCrawler Pro 3.1.1 - DoS
TextCrawler Pro 3.1.1 contains a denial of service vulnerability that allows attackers to crash the application by sending an oversized buffer in the license key field. Attackers can generate a 6000-byte payload and paste it into the activation field to trigger an application crash.
by stresser
CVSS 7.5
CVE-2020-37212 EXPLOITDB HIGH python VERIFIED
SpotMSN 2.4.6 - DoS
SpotMSN 2.4.6 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger an application crash.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37211 EXPLOITDB HIGH python VERIFIED
SpotIM 2.2 - DoS
SpotIM 2.2 contains a denial of service vulnerability that allows attackers to crash the application by inputting a large buffer in the registration name field. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger an application crash.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37210 EXPLOITDB HIGH python VERIFIED
SpotIE 2.9.5 - DoS
SpotIE 2.9.5 contains a denial of service vulnerability in the registration key input that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Key' field to trigger an application crash.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37209 EXPLOITDB HIGH python VERIFIED
SpotFTP 3.0.0.0 - DoS
SpotFTP 3.0.0.0 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Name' field to trigger an application crash.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37208 EXPLOITDB HIGH python
SpotFTP 3.0.0.0 - Buffer Overflow
SpotFTP 3.0.0.0 contains a buffer overflow vulnerability in the registration key input field that allows attackers to crash the application. Attackers can generate a 1000-character payload and paste it into the 'Key' field to trigger an application crash and denial of service.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37206 EXPLOITDB HIGH python VERIFIED
ShareAlarmPro - DoS
ShareAlarmPro contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized registration key. Attackers can generate a 1000-character buffer payload to trigger an application crash when pasted into the registration key field.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37205 EXPLOITDB HIGH python VERIFIED
RemShutdown 2.9.0.0 - DoS
RemShutdown 2.9.0.0 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the 'Name' registration field. Attackers can generate a 1000-character buffer payload and paste it into the registration name field to trigger an application crash.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37204 EXPLOITDB HIGH python VERIFIED
RemShutdown 2.9.0.0 - DoS
RemShutdown 2.9.0.0 contains a denial of service vulnerability in its registration key input that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the registration key field to trigger an application crash.
by Ismail Tasdelen
CVSS 7.5
CVE-2020-37203 EXPLOITDB HIGH python
Office Product Key Finder <1.5.4 - DoS
Office Product Key Finder 1.5.4 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the registration code input. Attackers can create a specially crafted text file and paste it into the 'Name and Key' field to trigger an application crash.
by Gokkulraj
CVSS 7.5