Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2014-0787 EXPLOITDB ruby
Wellintech Kingscada < 3.1.2 - Memory Corruption
Stack-based buffer overflow in WellinTech KingSCADA before 3.1.2.13 allows remote attackers to execute arbitrary code via a crafted packet.
by James Fitts
EIP-2026-118630 EXPLOITDB ruby
haneWIN DNS Server 1.5.3 - Remote Buffer Overflow (Metasploit)
by James Fitts
CVE-2013-0946 EXPLOITDB ruby
EMC AlphaStor 4.0 <build 910 - Buffer Overflow
Buffer overflow in the Library Control Program (LCP) in EMC AlphaStor 4.0 before build 910 allows remote attackers to execute arbitrary code via crafted commands.
by James Fitts
EIP-2026-118512 EXPLOITDB ruby
EMC AlphaStor Device Manager - Opcode 0x72 Buffer Overflow (Metasploit)
by James Fitts
EIP-2026-118373 EXPLOITDB ruby
Cloudview NMS 2.00b - Writable Directory Traversal Execution (Metasploit)
by James Fitts
CVE-2017-20184 EXPLOITDB HIGH ruby
Carlo Gavazzi Powersoft <2.1.1.1 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Carlo Gavazzi Powersoft up to version 2.1.1.1 allows an unauthenticated, remote attacker to download any file from the affected device.
by James Fitts
CVSS 7.5
CVE-2014-0780 EXPLOITDB CRITICAL ruby
Indusoft Web Studio - Path Traversal
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests.
by James Fitts
CVSS 9.8
CVE-2011-3487 EXPLOITDB ruby
Carel PlantVisor <2.4.4 - Path Traversal
Directory traversal vulnerability in CarelDataServer.exe in Carel PlantVisor 2.4.4 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP GET request.
by James Fitts
EIP-2026-119338 EXPLOITDB ruby
ZScada Modbus Buffer 2.0 - Stack Buffer Overflow (Metasploit)
by James Fitts
CVE-2017-5177 EXPLOITDB HIGH ruby
VIPA Controls WinPLC7 <5.0.45.5921 - Buffer Overflow
A Stack Buffer Overflow issue was discovered in VIPA Controls WinPLC7 5.0.45.5921 and prior. A stack-based buffer overflow vulnerability has been identified, where an attacker with a specially crafted packet could overflow the fixed length buffer. This could allow remote code execution.
by James Fitts
CVSS 7.5
EIP-2026-119130 EXPLOITDB ruby
Sielco Sistemi Winlog 2.07.16 - Remote Buffer Overflow (Metasploit)
by James Fitts
EIP-2026-118923 EXPLOITDB ruby
Motorola Netopia Netoctopus SDCS - Remote Stack Buffer Overflow (Metasploit)
by James Fitts
CVE-2016-8377 EXPLOITDB HIGH ruby
Fatek Automation PLC WinProladder <3.11 Build 14701 - Buffer Overflow
An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution.
by James Fitts
CVSS 8.0
CVE-2005-2842 EXPLOITDB ruby
DameWare Mini Remote Control <4.9.0 - RCE
Buffer overflow in dwrcs.exe in DameWare Mini Remote Control before 4.9.0 allows remote attackers to execute arbitrary code via the username.
by James Fitts
EIP-2026-118374 EXPLOITDB ruby
Cloudview NMS < 2.00b - Arbitrary File Upload (Metasploit)
by James Fitts
EIP-2026-104783 EXPLOITDB ruby
Trend Micro Control Manager - ImportFile Directory Traversal Remote Code Execution (Metasploit)
by James Fitts
CVE-2014-3805 EXPLOITDB ruby
Alienvault Open Source Security Infor... - Code Injection
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) get_license, (2) get_log_line, or (3) update_system/upgrade_pro_web request, a different vulnerability than CVE-2014-3804.
by James Fitts
CVE-2014-3804 EXPLOITDB ruby
Alienvault Open Source Security Infor... - Code Injection
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) update_system_info_debian_package, (2) ossec_task, (3) set_ossim_setup admin_ip, (4) sync_rserver, or (5) set_ossim_setup framework_ip request, a different vulnerability than CVE-2014-3805.
by James Fitts
CVE-2015-7901 EXPLOITDB ruby VERIFIED
Infinite Automation Mango Automation <2.6.0-430 - Command Injection
Infinite Automation Mango Automation 2.5.x and 2.6.x through 2.6.0 build 430 allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
by James Fitts
CVE-2013-6810 EXPLOITDB ruby
EMC Connectrix Manager - Code Injection
The server in Brocade Network Advisor before 12.1.0, as used in EMC Connectrix Manager Converged Network Edition (CMCNE), HP B-series SAN Network Advisor, and possibly other products, allows remote attackers to execute arbitrary code by using a servlet to upload an executable file.
by James Fitts
CVE-2013-6810 EXPLOITDB ruby
EMC Connectrix Manager - Code Injection
The server in Brocade Network Advisor before 12.1.0, as used in EMC Connectrix Manager Converged Network Edition (CMCNE), HP B-series SAN Network Advisor, and possibly other products, allows remote attackers to execute arbitrary code by using a servlet to upload an executable file.
by James Fitts
EIP-2026-114669 EXPLOITDB ruby VERIFIED
Docker Daemon - Unprotected TCP Socket (Metasploit)
by Metasploit
EIP-2026-118606 EXPLOITDB ruby VERIFIED
Gh0st Client (C2 Server) - Remote Buffer Overflow (Metasploit)
by Metasploit
EIP-2026-118605 EXPLOITDB ruby VERIFIED
Gh0st Client (C2 Server) - Remote Buffer Overflow (Metasploit)
by Metasploit
CVE-2017-1000117 EXPLOITDB HIGH ruby VERIFIED
Malicious Git HTTP Server For CVE-2017-1000117
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
by Metasploit
CVSS 8.8