Exploitdb Exploits

4,728 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-117158 EXPLOITDB python
Faleemi Windows Desktop Software - (DDNS/IP) Local Buffer Overflow
by Himavanth Reddy
EIP-2026-116758 EXPLOITDB python
Allok AVI DivX MPEG to DVD Converter 2.6.1217 - Buffer Overflow (SEH)
by wetw0rk
CVE-2018-0171 EXPLOITDB CRITICAL python
Cisco Ios - Out-of-Bounds Write
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.
by embedi
CVSS 9.8
CVE-2018-9148 EXPLOITDB CRITICAL python
Westerndigital MY Cloud Firmware - Authentication Bypass
Western Digital WD My Cloud v04.05.00-320 devices embed the session token (aka PHPSESSID) in filenames, which makes it easier for attackers to bypass authentication by listing a directory. NOTE: this can be exploited in conjunction with CVE-2018-7171 for remote authentication bypass within a product that uses My Cloud.
by Sven Fassbender
CVSS 9.8
CVE-2018-7171 EXPLOITDB HIGH python
Lynxtechnology Twonky Server < 8.5 - Path Traversal
Directory traversal vulnerability in Twonky Server 7.0.11 through 8.5 allows remote attackers to share the contents of arbitrary directories via a .. (dot dot) in the contentbase parameter to rpc/set_all.
by Sven Fassbender
CVSS 7.5
EIP-2026-117159 EXPLOITDB python
Fast AVI MPEG Splitter 1.2 - Stack-Based Buffer Overflow
by Mohan Ravichandran and Velayutham Selvaraj
CVE-2018-8947 EXPLOITDB HIGH python
Laravel Log Viewer < 0.13.0 - Cleartext Storage
rap2hpoutre Laravel Log Viewer before v0.13.0 relies on Base64 encoding for l, dl, and del requests, which makes it easier for remote attackers to bypass intended access restrictions, as demonstrated by reading arbitrary files via a dl request.
by Haboob Team
CVSS 7.5
CVE-2018-25223 EXPLOITDB CRITICAL python
Crashmail 1.6 Stack-based Buffer Overflow Remote Code Execution
Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service.
by Juan Sacco
CVSS 9.8
CVE-2017-13261 EXPLOITDB HIGH python
Google Android - Out-of-Bounds Read
In bnep_process_control_packet of bnep_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69177292.
by QuarksLab
CVSS 7.5
CVE-2017-13261 EXPLOITDB HIGH python
Google Android - Out-of-Bounds Read
In bnep_process_control_packet of bnep_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69177292.
by QuarksLab
CVSS 7.5
CVE-2017-13260 EXPLOITDB HIGH python
Google Android - Out-of-Bounds Read
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69177251.
by QuarksLab
CVSS 7.5
CVE-2017-13260 EXPLOITDB HIGH python
Google Android - Out-of-Bounds Read
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69177251.
by QuarksLab
CVSS 7.5
CVE-2017-13258 EXPLOITDB HIGH python
Google Android - Out-of-Bounds Read
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67863755.
by QuarksLab
CVSS 7.5
CVE-2017-13258 EXPLOITDB HIGH python
Google Android - Out-of-Bounds Read
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67863755.
by QuarksLab
CVSS 7.5
EIP-2026-119675 EXPLOITDB python
Hikvision IP Camera versions 5.2.0 - 5.3.9 (Builds 140721 < 170109) - Access Control Bypass
by Matamorphosis
EIP-2026-117091 EXPLOITDB python
Easy CD DVD Copy 1.3.24 - Local Buffer Overflow (SEH)
by Hashim Jawad
EIP-2026-116762 EXPLOITDB python
Allok Quicktime to AVI MPEG DVD Converter 4.6.1217 - Stack-Based Buffer Overflow
by Mohan Ravichandran and Velayutham Selvaraj
EIP-2026-116573 EXPLOITDB python
WM Recorder 16.8.1 - Denial of Service
by bzyo
EIP-2026-115183 EXPLOITDB python
Easy Avi Divx Xvid to DVD Burner 2.9.11 - '.avi' Denial of Service
by Hashim Jawad
EIP-2026-115182 EXPLOITDB python
Easy Avi Divx Xvid to DVD Burner 2.9.11 - '.avi' Denial of Service
by Hashim Jawad
EIP-2026-104688 EXPLOITDB python
XenForo 2 - CSS Loader Denial of Service
by LockedByte
CVE-2018-1218 EXPLOITDB HIGH python VERIFIED
Dell Emc Networker < 9.1.1.6 - Memory Corruption
In Dell EMC NetWorker versions prior to 9.2.1.1, versions prior to 9.1.1.6, 9.0.x, and versions prior to 8.2.4.11, the 'nsrd' daemon causes a buffer overflow condition when handling certain messages. A remote unauthenticated attacker could potentially exploit this vulnerability to cause a denial of service to the users of NetWorker systems.
by Marek Cybul
CVSS 7.5
CVE-2017-13262 EXPLOITDB MEDIUM python
Google Android - Out-of-Bounds Read
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing length decrement operation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69271284.
by QuarksLab
CVSS 6.5
CVE-2017-13262 EXPLOITDB MEDIUM python
Google Android - Out-of-Bounds Read
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing length decrement operation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69271284.
by QuarksLab
CVSS 6.5
CVE-2018-0114 EXPLOITDB HIGH python
Cisco Node-jose < 0.11.0 - Signature Verification Bypass
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
by zioBlack
CVSS 7.5