Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-10660 EXPLOITDB CRITICAL ruby VERIFIED
Axis A1001 Firmware < 1.65.1 - OS Command Injection
An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection.
by Metasploit
CVSS 9.8
EIP-2026-104792 EXPLOITDB ruby VERIFIED
WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit)
by Metasploit
CVE-2018-10662 EXPLOITDB CRITICAL ruby VERIFIED
Axis IP Cameras - Info Disclosure
An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.
by Metasploit
CVSS 9.8
CVE-2018-12464 EXPLOITDB CRITICAL ruby
Micro Focus Secure Messaging Gateway <471 - SQL Injection
A SQL injection vulnerability in the web administration and quarantine components of Micro Focus Secure Messaging Gateway allows an unauthenticated remote attacker to execute arbitrary SQL statements against the database. This can be exploited to create an administrative account and used in conjunction with CVE-2018-12465 to achieve unauthenticated remote code execution. Affects Micro Focus Secure Messaging Gateway versions prior to 471. It does not affect previous versions of the product that use the GWAVA product name (i.e. GWAVA 6.5).
by Mehmet Ince
CVSS 10.0
CVE-2018-12465 EXPLOITDB CRITICAL ruby
Micro Focus SMG <471 - Command Injection
An OS command injection vulnerability in the web administration component of Micro Focus Secure Messaging Gateway (SMG) allows a remote attacker authenticated as a privileged user to execute arbitrary OS commands on the SMG server. This can be exploited in conjunction with CVE-2018-12464 to achieve unauthenticated remote code execution. Affects Micro Focus Secure Messaging Gateway versions prior to 471. It does not affect previous versions of the product that used GWAVA product name (i.e. GWAVA 6.5).
by Mehmet Ince
CVSS 9.1
CVE-2017-16995 EXPLOITDB HIGH ruby VERIFIED
Linux BPF Sign Extension Local Privilege Escalation
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
by Metasploit
CVSS 7.8
CVE-2018-0706 EXPLOITDB HIGH ruby VERIFIED
QNAP Q'center Virtual Appliance <1.7.1063 - Info Disclosure
Exposure of Private Information in QNAP Q'center Virtual Appliance version 1.7.1063 and earlier could allow authenticated users to access sensitive information.
by Metasploit
CVSS 8.8
CVE-2018-1000049 EXPLOITDB HIGH ruby VERIFIED
Nanopool Claymore Dual Miner <7.3 - RCE
Nanopool Claymore Dual Miner version 7.3 and earlier contains a remote code execution vulnerability by abusing the miner API. The flaw can be exploited only if the software is executed with read/write mode enabled.
by Metasploit
CVSS 7.5
CVE-2018-0707 EXPLOITDB HIGH ruby VERIFIED
Qnap Q'center < 1.7.1063 - OS Command Injection
Command injection vulnerability in change password of QNAP Q'center Virtual Appliance version 1.7.1063 and earlier could allow authenticated users to run arbitrary commands.
by Metasploit
CVSS 7.2
CVE-2017-12635 EXPLOITDB CRITICAL ruby VERIFIED
Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
by Metasploit
CVSS 9.8
CVE-2018-8897 EXPLOITDB HIGH ruby VERIFIED
Intel 64 and IA-32 Architectures - Privilege Escalation
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
by Metasploit
CVSS 7.8
CVE-2018-12613 EXPLOITDB HIGH ruby VERIFIED
phpMyAdmin 4.8.x <4.8.2 - Code Injection
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
by Metasploit
CVSS 8.8
EIP-2026-103127 EXPLOITDB ruby VERIFIED
Hadoop YARN ResourceManager - Command Execution (Metasploit)
by Metasploit
EIP-2026-103126 EXPLOITDB ruby VERIFIED
Hadoop YARN ResourceManager - Command Execution (Metasploit)
by Metasploit
CVE-2017-12636 EXPLOITDB HIGH ruby VERIFIED
Apache Couchdb < 1.7.0 - OS Command Injection
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
by Metasploit
CVSS 7.2
EIP-2026-102344 EXPLOITDB ruby VERIFIED
Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit)
by Metasploit
EIP-2026-102343 EXPLOITDB ruby VERIFIED
Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit)
by Metasploit
CVE-2018-1418 EXPLOITDB HIGH ruby VERIFIED
IBM Security QRadar SIEM <7.4 - Auth Bypass
IBM Security QRadar SIEM 7.2 and 7.3 could allow a user to bypass authentication which could lead to code execution. IBM X-Force ID: 138824.
by Metasploit
CVSS 8.8
CVE-2016-9722 EXPLOITDB MEDIUM ruby VERIFIED
IBM Qradar Security Information And E... - Improper Access Control
IBM QRadar 7.2 and 7.3 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 119737.
by Metasploit
CVSS 4.2
CVE-2018-1612 EXPLOITDB MEDIUM ruby VERIFIED
IBM QRadar <7.3 - Auth Bypass
IBM QRadar Incident Forensics (IBM QRadar SIEM 7.2, and 7.3) could allow a remote attacker to bypass authentication and obtain sensitive information. IBM X-Force ID: 144164.
by Metasploit
CVSS 5.8
EIP-2026-104729 EXPLOITDB ruby VERIFIED
GitList 0.6.0 - Argument Injection (Metasploit)
by Metasploit
EIP-2026-104728 EXPLOITDB ruby VERIFIED
GitList 0.6.0 - Argument Injection (Metasploit)
by Metasploit
EIP-2026-103142 EXPLOITDB ruby VERIFIED
HP VAN SDN Controller - Root Command Injection (Metasploit)
by Metasploit
EIP-2026-103138 EXPLOITDB ruby VERIFIED
HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit)
by Metasploit
EIP-2026-103137 EXPLOITDB ruby VERIFIED
HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit)
by Metasploit