Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-0144 EXPLOITDB HIGH ruby VERIFIED
Microsoft Server Message Block < 4.0e - Remote Code Execution
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
by Sean Dillon
CVSS 8.8
CVE-2017-0143 EXPLOITDB HIGH ruby VERIFIED
Microsoft Server Message Block < 4.0e - Remote Code Execution
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
by Sean Dillon
CVSS 8.8
CVE-2017-0147 EXPLOITDB HIGH ruby VERIFIED
Microsoft Windows 10 1507 < 4.0e - Information Disclosure
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability."
by Sean Dillon
CVSS 7.5
EIP-2026-116562 EXPLOITDB ruby VERIFIED
WinSCP 5.9.4 - 'LIST' Denial of Service (Metasploit)
by mohammed Mohammed
EIP-2026-105095 EXPLOITDB ruby
Alienvault OSSIM/USM 5.3.4/5.3.5 - Remote Command Execution (Metasploit)
by Peter Lapp
CVE-2016-9091 EXPLOITDB HIGH ruby VERIFIED
Blue Coat ASG <6.6.5.4 & CAS <1.3.7.4 - Command Injection
Blue Coat Advanced Secure Gateway (ASG) 6.6 before 6.6.5.4 and Content Analysis System (CAS) 1.3 before 1.3.7.4 are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges.
by Chris Hebert
CVSS 7.2
CVE-2016-9091 EXPLOITDB HIGH ruby VERIFIED
Blue Coat ASG <6.6.5.4 & CAS <1.3.7.4 - Command Injection
Blue Coat Advanced Secure Gateway (ASG) 6.6 before 6.6.5.4 and Content Analysis System (CAS) 1.3 before 1.3.7.4 are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges.
by Chris Hebert
CVSS 7.2
EIP-2026-103114 EXPLOITDB ruby VERIFIED
Github Enterprise - Default Session Secret and Deserialization (Metasploit)
by Metasploit
EIP-2026-103113 EXPLOITDB ruby VERIFIED
Github Enterprise - Default Session Secret and Deserialization (Metasploit)
by Metasploit
CVE-2017-5869 EXPLOITDB HIGH ruby
Nuxeo - Path Traversal
Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header.
by Sysdream
CVSS 8.8
EIP-2026-114670 EXPLOITDB ruby VERIFIED
Logsign 4.4.2/4.4.137 - Remote Command Injection (Metasploit)
by Mehmet Ince
CVE-2016-10174 EXPLOITDB CRITICAL ruby VERIFIED
Netgear D6100 Firmware - Buffer Overflow
The NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution.
by Pedro Ribeiro
CVSS 9.8
EIP-2026-103223 EXPLOITDB ruby
SolarWinds LEM 6.3.1 - Remote Code Execution (Metasploit)
by Mehmet Ince
CVE-2015-7450 EXPLOITDB CRITICAL ruby VERIFIED
IBM Products - Command Injection
Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.
by Metasploit
CVSS 9.8
EIP-2026-114696 EXPLOITDB ruby VERIFIED
GitHub Enterprise 2.8.0 < 2.8.6 - Remote Code Execution
by iblue
CVE-2017-5638 EXPLOITDB CRITICAL ruby VERIFIED
Apache Struts < 2.3.32 - Improper Exception Handling
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
by Metasploit
CVSS 9.8
CVE-2016-6277 EXPLOITDB HIGH ruby VERIFIED
NETGEAR - RCE
NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
by Metasploit
CVSS 8.8
EIP-2026-119203 EXPLOITDB ruby VERIFIED
SysGauge 1.5.18 - SMTP Validation Buffer Overflow (Metasploit)
by Metasploit
CVE-2016-20016 EXPLOITDB CRITICAL ruby VERIFIED
MVPower CCTV DVR - RCE
MVPower CCTV DVR models, including TV-7104HE 1.8.4 115215B9 and TV7108HE, contain a web shell that is accessible via a /shell URI. A remote unauthenticated attacker can execute arbitrary operating system commands as root. This vulnerability has also been referred to as the "JAWS webserver RCE" because of the easily identifying HTTP response server field. Other firmware versions, at least from 2014 through 2019, can be affected. This was exploited in the wild in 2017 through 2022.
by Metasploit
CVSS 9.8
CVE-2017-5173 EXPLOITDB CRITICAL ruby VERIFIED
Geutebruck IP Camera G-Cam/EFD-2250 <1.11.0.12 - Command Injection
An Improper Neutralization of Special Elements (in an OS command) issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An improper neutralization of special elements vulnerability has been identified. If special elements are not properly neutralized, an attacker can call multiple parameters that can allow access to the root level operating system which could allow remote code execution.
by RandoriSec
CVSS 9.8
CVE-2017-5174 EXPLOITDB CRITICAL ruby VERIFIED
Geutebruck IP Camera G-Cam/EFD-2250 <1.11.0.12 - Auth Bypass
An Authentication Bypass issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An authentication bypass vulnerability has been identified. The existing file system architecture could allow attackers to bypass the access control that may allow remote code execution.
by RandoriSec
CVSS 9.8
EIP-2026-104765 EXPLOITDB ruby VERIFIED
Piwik 2.14.0/2.16.0/2.17.1/3.0.1 - Superuser Plugin Upload (Metasploit)
by Metasploit
CVE-2016-8523 EXPLOITDB HIGH ruby VERIFIED
HPE Smart Storage Administrator <2.60.18.0 - RCE
A Remote Arbitrary Code Execution vulnerability in HPE Smart Storage Administrator version before v2.60.18.0 was found.
by MaKyOtOx
CVSS 8.8
EIP-2026-103341 EXPLOITDB ruby
WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby)
by Harsh Jaiswal
CVE-2016-8580 EXPLOITDB CRITICAL ruby
AlienVault OSSIM & USM <5.3.2 - Code Injection
PHP object injection vulnerabilities exist in multiple widget files in AlienVault OSSIM and USM before 5.3.2. These vulnerabilities allow arbitrary PHP code execution via magic methods in included classes.
by Mehmet Ince
CVSS 9.8