Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-6334 EXPLOITDB HIGH ruby VERIFIED
Netgear Dgn2200 Series Firmware < 10.0.0.50 - OS Command Injection
dnslookup.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the host_name field of an HTTP POST request, a different vulnerability than CVE-2017-6077.
by Metasploit
CVSS 8.8
EIP-2026-118459 EXPLOITDB ruby VERIFIED
Easy File Sharing HTTP Server 7.2 - POST Buffer Overflow (Metasploit)
by Metasploit
EIP-2026-117541 EXPLOITDB ruby VERIFIED
Microsoft Windows - UAC Protection Bypass via FodHelper Registry Key (Metasploit)
by Metasploit
EIP-2026-117540 EXPLOITDB ruby VERIFIED
Microsoft Windows - UAC Protection Bypass via FodHelper Registry Key (Metasploit)
by Metasploit
CVE-2017-20198 EXPLOITDB CRITICAL ruby VERIFIED
DC/OS <1.9.0 - RCE
The Marathon UI in DC/OS < 1.9.0 allows unauthenticated users to deploy arbitrary Docker containers. Due to improper restriction of volume mount configurations, attackers can deploy a container that mounts the host's root filesystem (/) with read/write privileges. When using a malicious Docker image, the attacker can write to /etc/cron.d/ on the host, achieving arbitrary code execution with root privileges. This impacts any system where the Docker daemon honors Marathon container configurations without policy enforcement.
by Metasploit
EIP-2026-118978 EXPLOITDB ruby VERIFIED
Octopus Deploy - (Authenticated) Code Execution (Metasploit)
by Metasploit
CVE-2017-7494 EXPLOITDB CRITICAL ruby VERIFIED
Samba is_known_pipename() Arbitrary Module Load
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
by Metasploit
CVSS 9.8
EIP-2026-119263 EXPLOITDB ruby VERIFIED
VX Search Enterprise 9.5.12 - GET Buffer Overflow (Metasploit)
by Metasploit
CVE-2025-34101 EXPLOITDB CRITICAL ruby VERIFIED
Serviio Media Server <1.8 - Command Injection
An unauthenticated command injection vulnerability exists in Serviio Media Server versions 1.4 through 1.8 on Windows, in the /rest/action API endpoint exposed by the console component (default port 23423). The checkStreamUrl method accepts a VIDEO parameter that is passed unsanitized to a call to cmd.exe, enabling arbitrary command execution under the privileges of the web server. No authentication is required to exploit this issue, as the REST API is exposed by default and lacks access controls.
by Metasploit
EIP-2026-118444 EXPLOITDB ruby VERIFIED
Dup Scout Enterprise 9.5.14 - GET Buffer Overflow (Metasploit)
by Metasploit
CVE-2016-10033 EXPLOITDB CRITICAL ruby VERIFIED
PHPMailer Sendmail Argument Injection
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
by Metasploit
CVSS 9.8
EIP-2026-104717 EXPLOITDB ruby VERIFIED
BuilderEngine 3.5.0 - Arbitrary File Upload and Execution (Metasploit)
by Metasploit
CVE-2017-6553 EXPLOITDB CRITICAL ruby VERIFIED
Quest Privilege Manager For Unix < 6.0.0-50 - Memory Corruption
Buffer Overflow in Quest One Identity Privilege Manager for Unix before 6.0.0.061 allows remote attackers to obtain full access to the policy server via an ACT_ALERT_EVENT request that causes memory corruption in the pmmasterd daemon.
by Metasploit
CVSS 9.8
CVE-2017-7269 EXPLOITDB CRITICAL ruby VERIFIED
IIS 6.0 - Buffer Overflow
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
by Metasploit
CVSS 9.8
CVE-2025-34102 EXPLOITDB CRITICAL ruby VERIFIED
CryptoLog PHP - RCE
A remote code execution vulnerability exists in CryptoLog (PHP version, discontinued since 2009) due to a chained exploitation of SQL injection and command injection vulnerabilities. An unauthenticated attacker can gain shell access as the web server user by first exploiting a SQL injection flaw in login.php to bypass authentication, followed by command injection in logshares_ajax.php to execute arbitrary operating system commands. The login bypass is achieved by submitting crafted SQL via the user POST parameter. Once authenticated, the attacker can abuse the lsid POST parameter in the logshares_ajax.php endpoint to inject and execute a command using $(...) syntax, resulting in code execution under the web context. This exploitation path does not exist in the ASP.NET version of CryptoLog released since 2009.
by Mehmet Ince
CVE-2017-8779 EXPLOITDB HIGH ruby
Rpcbind < 0.2.4 - Resource Allocation Without Limits
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
by Guido Vranken
CVSS 7.5
CVE-2017-8291 EXPLOITDB HIGH ruby VERIFIED
Ghostscript Type Confusion Arbitrary Command Execution
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
by Metasploit
CVSS 7.8
EIP-2026-114672 EXPLOITDB ruby VERIFIED
Mercurial - Custom hg-ssh Wrapper Remote Code Exec (Metasploit)
by Metasploit
CVE-2025-34103 EXPLOITDB CRITICAL ruby VERIFIED
WePresent WiPG-1000 <2.2.3.0 - Command Injection
An unauthenticated command injection vulnerability exists in WePresent WiPG-1000 firmware versions prior to 2.2.3.0, due to improper input handling in the undocumented /cgi-bin/rdfs.cgi endpoint. The Client parameter is not sanitized before being passed to a system call, allowing an unauthenticated remote attacker to execute arbitrary commands as the web server user.
by Metasploit
CVE-2017-0199 EXPLOITDB HIGH ruby VERIFIED
Microsoft Office Word Malicious Hta Execution
Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
by Metasploit
CVSS 7.8
EIP-2026-101310 EXPLOITDB ruby VERIFIED
Huawei HG532n - Command Injection (Metasploit)
by Metasploit
EIP-2026-101309 EXPLOITDB ruby VERIFIED
Huawei HG532n - Command Injection (Metasploit)
by Metasploit
CVE-2017-0148 EXPLOITDB HIGH ruby VERIFIED
Microsoft Server Message Block < 4.0e - Improper Input Validation
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.
by Sean Dillon
CVSS 8.1
CVE-2017-0146 EXPLOITDB HIGH ruby VERIFIED
Microsoft Server Message Block < 4.0e - Remote Code Execution
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.
by Sean Dillon
CVSS 8.8
CVE-2017-0145 EXPLOITDB HIGH ruby VERIFIED
Microsoft Server Message Block < 4.0e - Remote Code Execution
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.
by Sean Dillon
CVSS 8.8