Exploitdb Exploits

4,728 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-25301 EXPLOITDB HIGH python
Easy MPEG to DVD Burner 1.7.11 SEH Local Buffer Overflow
Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string. Attackers can craft a payload containing junk data, SEH chain pointers, and shellcode that overwrites the SEH handler to redirect execution and run arbitrary commands like opening calc.exe.
by Marwan Shamel
CVSS 8.4
CVE-2018-10583 EXPLOITDB HIGH python
LibreOffice 6.0.3 - Apache OpenOffice Writer 4.1.5 - Info Disclosure
An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by xlink:href=file://192.168.0.2/test.jpg within an office:document-content element in a .odt XML document.
by Richard Davy
CVSS 7.5
CVE-2018-6789 EXPLOITDB CRITICAL python
Exim < 4.90.1 - Buffer Overflow
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
by straight_blast
CVSS 9.8
CVE-2018-9995 EXPLOITDB CRITICAL python
TBK DVR4104/DVR4216 - Auth Bypass
TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass authentication via a "Cookie: uid=admin" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides credentials within JSON data in a response.
by ezelf
CVSS 9.8
CVE-2018-8735 EXPLOITDB HIGH python VERIFIED
Nagios XI <5.4.13 - RCE
Remote command execution (RCE) vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to execute arbitrary commands on the target system, aka OS command injection.
by Jared Arave
CVSS 8.8
CVE-2018-8734 EXPLOITDB CRITICAL python VERIFIED
Nagios XI <5.4.13 - SQL Injection
SQL injection vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to execute arbitrary SQL commands via the selInfoKey1 parameter.
by Jared Arave
CVSS 9.8
CVE-2018-8733 EXPLOITDB CRITICAL python VERIFIED
Nagios XI <5.4.13 - Auth Bypass
Authentication bypass vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an unauthenticated attacker to make configuration changes and leverage an authenticated SQL injection vulnerability.
by Jared Arave
CVSS 9.8
EIP-2026-115899 EXPLOITDB python
Navicat < 12.0.27 - Oracle Connection Overflow
by Kevin McGuigan
CVE-2018-8736 EXPLOITDB HIGH python VERIFIED
Nagios XI <5.4.13 - Privilege Escalation
A privilege escalation vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to leverage an RCE vulnerability escalating to root.
by Jared Arave
CVSS 8.8
CVE-2018-25302 EXPLOITDB HIGH python
Allok AVI to DVD SVCD VCD Converter 4.0.1217 Buffer Overflow SEH
Allok AVI to DVD SVCD VCD Converter 4.0.1217 contains a structured exception handling (SEH) based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the License Name field. Attackers can craft a payload with junk data, NSEH bypass, SEH handler address, and shellcode that triggers the overflow when pasted into the License Name field and the Register button is clicked, resulting in code execution.
by T3jv1l
CVSS 7.8
EIP-2026-107414 EXPLOITDB python VERIFIED
GitList 0.6 - Remote Code Execution
by Kacper Szurek
CVE-2018-9160 EXPLOITDB CRITICAL python
Sickrage < 9.2.101 - Insufficiently Protected Credentials
SickRage before v2018.03.09-1 includes cleartext credentials in HTTP responses.
by Sven Fassbender
CVSS 9.8
CVE-2018-25303 EXPLOITDB HIGH python
Allok Video to DVD Burner 2.6.1217 Buffer Overflow SEH
Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability in the License Name field that allows local attackers to execute arbitrary code by triggering a structured exception handler (SEH) overwrite. Attackers can craft a malicious input string with 780 bytes of junk data followed by SEH chain pointers and shellcode, then paste it into the License Name field during registration to achieve code execution.
by T3jv1l
CVSS 8.4
CVE-2018-10286 EXPLOITDB HIGH python
Ericsson-LG iPECS NMS A.1Ac - Info Disclosure
The Ericsson-LG iPECS NMS A.1Ac web application discloses sensitive information such as the NMS admin credentials and the PostgreSQL database credentials to logged-in users via the responses to certain HTTP POST requests. In order to be able to see the credentials in cleartext, an attacker needs to be authenticated.
by Berk Cem Göksel
CVSS 8.8
CVE-2018-10285 EXPLOITDB CRITICAL python
Ericsson-LG iPECS NMS A.1Ac - Auth Bypass
The Ericsson-LG iPECS NMS A.1Ac web application uses incorrect access control mechanisms. Since the app does not use any sort of session ID, an attacker might bypass authentication.
by Berk Cem Göksel
CVSS 9.8
CVE-2018-9059 EXPLOITDB CRITICAL python
Sharing-file Easy File Sharing Web Server - Memory Corruption
Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 7.2 allows remote attackers to execute arbitrary code via a malicious login request to forum.ghp. NOTE: this may overlap CVE-2014-3791.
by Hashim Jawad
CVSS 9.8
EIP-2026-117854 EXPLOITDB python
RGui 3.4.4 - Local Buffer Overflow
by bzyo
CVE-2017-8311 EXPLOITDB HIGH python
Videolan Vlc Media Player < 2.2.4 - Memory Corruption
Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file.
by SivertPL
CVSS 7.8
EIP-2026-115686 EXPLOITDB python
Microsoft Internet Explorer 11.371.16299.0 (Windows 10) - Denial Of Service
by hyp3rlinx
CVE-2017-14322 EXPLOITDB CRITICAL python
Interspire Email Marketer <6.1.6 - Auth Bypass
The function in charge to check whether the user is already logged in init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows remote attackers to bypass authentication and obtain administrative access by using the IEM_CookieLogin cookie with a specially crafted value.
by devcoinfet
CVSS 9.8
CVE-2018-9245 EXPLOITDB CRITICAL python
Ericssonlg Ipecs Nms - SQL Injection
The Ericsson-LG iPECS NMS A.1Ac login portal has a SQL injection vulnerability in the User ID and password fields that allows users to bypass the login page and execute remote code on the operating system.
by Berk Cem Göksel
CVSS 9.8
EIP-2026-102624 EXPLOITDB python
Kaspersky KSN for Linux 5.2 - Memory Corruption
by Juan Sacco
CVE-2018-25304 EXPLOITDB HIGH python
Free Download Manager 2.0 Built 417 Local Buffer Overflow SEH
Free Download Manager 2.0 Built 417 contains a local buffer overflow vulnerability in the URL import functionality that allows attackers to trigger a structured exception handler (SEH) chain exploitation. Attackers can craft a malicious URL file that, when imported through the File > Import > Import lists of downloads menu, causes a buffer overflow in the Location header response that overwrites the SEH chain and executes arbitrary code.
by Marwan Shamel
CVSS 8.4
CVE-2018-10253 EXPLOITDB HIGH python
Paessler PRTG Network Monitor <18.1.39.1648 - Buffer Overflow
Paessler PRTG Network Monitor before 18.1.39.1648 mishandles stack memory during unspecified API calls.
by luriel
CVSS 7.5
CVE-2017-12635 EXPLOITDB CRITICAL python
Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
by r4wd3r
CVSS 9.8