Exploitdb Exploits

4,728 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-115535 EXPLOITDB python
LabF nfsAxe 3.7 TFTP Client - Local Buffer Overflow
by Miguel Mendez Z
EIP-2026-104131 EXPLOITDB python
Werkzeug - 'Debug Shell' Command Execution
by Ali BawazeEer
EIP-2026-103233 EXPLOITDB python VERIFIED
Trend Micro Threat Discovery Appliance 2.6.1062r1 - 'dlp_policy_upload.cgi' Remote Code Execution
by mr_me
CVE-2016-1542 EXPLOITDB HIGH python
BMC BladeLogic Server Automation <8.7 - Auth Bypass
The RPC API in RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and enumerate users by sending an action packet to xmlrpc after an authorization failure.
by Paul Taylor
CVSS 7.5
CVE-2016-5063 EXPLOITDB MEDIUM python
BMC Server Automation < 8.6 - Improper Authorization
The RSCD agent in BMC Server Automation before 8.6 SP1 Patch 2 and 8.7 before Patch 3 on Windows might allow remote attackers to bypass authorization checks and make an RPC call via unspecified vectors.
by Paul Taylor
CVSS 5.3
CVE-2016-1543 EXPLOITDB HIGH python
BMC BladeLogic Server Automation <8.8 - Auth Bypass
The RPC API in the RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and reset arbitrary user passwords by sending an action packet to xmlrpc after an authorization failure.
by Paul Taylor
CVSS 7.5
EIP-2026-101529 EXPLOITDB python
ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password
by Víctor Calvo
CVE-2017-11317 EXPLOITDB CRITICAL python
Telerik UI For Asp.net Ajax < 2016.3.1027 - Weak Encryption
Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
by Paul Taylor
CVSS 9.8
CVE-2018-5997 EXPLOITDB CRITICAL python
RAVPower Filehub <2.000.056 - RCE
An issue was discovered in the HTTP Server in RAVPower Filehub 2.000.056. Due to an unrestricted upload feature and a path traversal vulnerability, it is possible to upload a file on a filesystem with root privileges: this will lead to remote code execution as root.
by Daniele Linguaglossa & Stefano Farletti
CVSS 9.8
CVE-2017-9248 EXPLOITDB CRITICAL python
Telerik UI <R2 2017 SP1-10.0.6412.0 - MachineKey Leak
Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
by Paul Taylor
CVSS 9.8
CVE-2017-11357 EXPLOITDB CRITICAL python
Telerik UI For Asp.net Ajax < 2020.1.114 - Unrestricted File Upload
Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
by Paul Taylor
CVSS 9.8
CVE-2017-14355 EXPLOITDB HIGH python VERIFIED
HPE Connected Backup <8.8.6 - Privilege Escalation
A potential security vulnerability has been identified in HPE Connected Backup versions 8.6 and 8.8.6. The vulnerability could be exploited locally to allow escalation of privilege.
by Peter Lapp
CVSS 7.8
EIP-2026-115844 EXPLOITDB python
MixPad 5.00 - Buffer Overflow
by bzyo
CVE-2018-5319 EXPLOITDB HIGH python
RAVPower FileHub 2.000.056 - Info Disclosure
RAVPower FileHub 2.000.056 allows remote users to steal sensitive information via a crafted HTTP request.
by Daniele Linguaglossa
CVSS 7.5
EIP-2026-101297 EXPLOITDB python
Herospeed - 'TelnetSwitch' Remote Stack Overflow / Overwrite Password / Enable TelnetD
by bashis
EIP-2026-107415 EXPLOITDB python
GitStack 2.3.10 - Remote Code Execution
by Kacper Szurek
CVE-2017-12718 EXPLOITDB HIGH python
Smiths-medical Medfusion 4000 Wireles... - Memory Corruption
A Classic Buffer Overflow issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. A third-party component used in the pump does not verify input buffer size prior to copying, leading to a buffer overflow, allowing remote code execution on the target device. The pump receives the potentially malicious input infrequently and under certain conditions, increasing the difficulty of exploitation.
by Scott Gayou
CVSS 8.1
CVE-2018-5359 EXPLOITDB HIGH python
Flexense SysGauge <3.6.18 - Buffer Overflow
The server in Flexense SysGauge 3.6.18 operating on port 9221 can be exploited remotely with the attacker gaining system-level access because of a Buffer Overflow.
by Ahmad Mahfouz
CVSS 8.1
CVE-2017-15663 EXPLOITDB HIGH python
Flexense Disk Pulse - Denial of Service
In Flexense Disk Pulse Enterprise v10.1.18, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9120.
by Ahmad Mahfouz
CVSS 7.5
EIP-2026-115983 EXPLOITDB python
OBS Studio 20.1.3 - Local Buffer Overflow
by ScrR1pTK1dd13
CVE-2014-4688 EXPLOITDB python
pfSense <2.1.4 - Command Injection
pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php.
by absolomb
EIP-2026-104220 EXPLOITDB python
DarkComet (C2 Server) - File Upload
by Pseudo Laboratories
EIP-2026-101462 EXPLOITDB python VERIFIED
Synology Photo Station 6.8.2-3461 - 'SYNOPHOTO_Flickr_MultiUpload' Race Condition File Write Remote Code Execution
by mr_me
CVE-2017-17932 EXPLOITDB CRITICAL python
Allmediaserver < 0.95 - Memory Corruption
A buffer overflow vulnerability exists in MediaServer.exe in ALLPlayer ALLMediaServer 0.95 and earlier that could allow remote attackers to execute arbitrary code and/or cause denial of service on the victim machine/computer via a long string to TCP port 888.
by Mario Kartone Ciccarelli
CVSS 9.8
CVE-2018-25115 EXPLOITDB CRITICAL python
D-Link DIR-series <1.03 - RCE
Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.
by Cr0n1c
CVSS 9.8