Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2016-9079 EXPLOITDB HIGH ruby VERIFIED
SVG Animation - Use After Free
A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox < 50.0.2, Firefox ESR < 45.5.1, and Thunderbird < 45.5.1.
by Metasploit
CVSS 7.5
CVE-2017-11517 EXPLOITDB CRITICAL ruby
Geutebrueck Gcore <1.4.2.37 - Buffer Overflow
Stack-based buffer overflow in GCoreServer.exe in the server in Geutebrueck Gcore 1.3.8.42 and 1.4.2.37 allows remote attackers to execute arbitrary code via a long URI in a GET request.
by Maurice Popp
CVSS 9.8
EIP-2026-118416 EXPLOITDB ruby VERIFIED
Disk Savvy Enterprise - GET Buffer Overflow (Metasploit)
by Metasploit
EIP-2026-118415 EXPLOITDB ruby VERIFIED
Disk Savvy Enterprise - GET Buffer Overflow (Metasploit)
by Metasploit
CVE-2017-5594 EXPLOITDB HIGH ruby VERIFIED
Pagekit < 1.0.10 - Password Reset Weakness
An issue was discovered in Pagekit CMS before 1.0.11. In this vulnerability the remote attacker is able to reset the registered user's password, when the debug toolbar is enabled. The password is successfully recovered using this exploit. The SecureLayer7 ID is SL7_PGKT_01.
by Saurabh Banawar
CVSS 7.5
EIP-2026-118426 EXPLOITDB ruby VERIFIED
DiskBoss Enterprise - GET Buffer Overflow (Metasploit)
by Metasploit
EIP-2026-104469 EXPLOITDB ruby
Trend Micro InterScan Messaging Security (Virtual Appliance) < 9.1.-1600 - Remote Code Execution (Metasploit)
by Mehmet Ince
CVE-2016-6433 EXPLOITDB HIGH ruby VERIFIED
Cisco Firepower Mgmt Cntr <6.0.1 - RCE
The Threat Management Console in Cisco Firepower Management Center 5.2.0 through 6.0.1 allows remote authenticated users to execute arbitrary commands via crafted web-application parameters, aka Bug ID CSCva30872.
by Metasploit
CVSS 8.8
CVE-2013-6282 EXPLOITDB HIGH ruby VERIFIED
Android get_user/put_user Exploit
The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
by Metasploit
CVSS 8.8
CVE-2016-1004 EXPLOITDB ruby VERIFIED
Rejected
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none
by Metasploit
CVE-2016-9683 EXPLOITDB CRITICAL ruby
Dell Sonicwall Secure Remote Access Server - Command Injection
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'extensionsettings' CGI (/cgi-bin/extensionsettings) component responsible for handling some of the server's internal configurations. The CGI application doesn't properly escape the information it's passed when processing a particular multi-part form request involving scripts. The filename of the 'scriptname' variable is read in unsanitized before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. This is SonicWall Issue ID 181195.
by xort
CVSS 9.8
CVE-2016-9684 EXPLOITDB CRITICAL ruby
Dell Sonicwall Secure Remote Access Server - Command Injection
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI (/cgi-bin/viewcert) component responsible for processing SSL certificate information. The CGI application doesn't properly escape the information it's passed in the 'CERT' variable before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account.
by xort
CVSS 9.8
CVE-2016-10175 EXPLOITDB CRITICAL ruby
Netgear Wnr2000v5 Firmware < 1.0.0.34 - Information Disclosure
The NETGEAR WNR2000v5 router leaks its serial number when performing a request to the /BRS_netgear_success.html URI. This serial number allows a user to obtain the administrator username and password, when used in combination with the CVE-2016-10176 vulnerability that allows resetting the answers to the password-recovery questions.
by Pedro Ribeiro
CVSS 9.8
CVE-2016-10174 EXPLOITDB CRITICAL ruby
Netgear D6100 Firmware - Buffer Overflow
The NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution.
by Pedro Ribeiro
CVSS 9.8
CVE-2016-10176 EXPLOITDB CRITICAL ruby
Netgear Wnr2000v5 Firmware < 1.0.0.34 - Improper Input Validation
The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution.
by Pedro Ribeiro
CVSS 9.8
CVE-2016-9553 EXPLOITDB HIGH ruby VERIFIED
Sophos Web Appliance - Command Injection
The Sophos Web Appliance (version 4.2.1.3) is vulnerable to two Remote Command Injection vulnerabilities affecting its web administrative interface. These vulnerabilities occur in the MgrReport.php (/controllers/MgrReport.php) component responsible for blocking and unblocking IP addresses from accessing the device. The device doesn't properly escape the information passed in the variables 'unblockip' and 'blockip' before calling the shell_exec() function which allows for system commands to be injected into the device. The code erroneously suggests that the information handled is protected by utilizing the variable name 'escapedips' - however this was not the case. The Sophos ID is NSWA-1258.
by xort
CVSS 7.2
CVE-2016-9554 EXPLOITDB HIGH ruby VERIFIED
Sophos Web Appliance - Command Injection
The Sophos Web Appliance Remote / Secure Web Gateway server (version 4.2.1.3) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. These vulnerabilities occur in MgrDiagnosticTools.php (/controllers/MgrDiagnosticTools.php), in the component responsible for performing diagnostic tests with the UNIX wget utility. The application doesn't properly escape the information passed in the 'url' variable before calling the executeCommand class function ($this->dtObj->executeCommand). This function calls exec() with unsanitized user input allowing for remote command injection. The page that contains the vulnerabilities, /controllers/MgrDiagnosticTools.php, is accessed by a built-in command answered by the administrative interface. The command that calls to that vulnerable page (passed in the 'section' parameter) is: 'configuration'. Exploitation of this vulnerability yields shell access to the remote machine under the 'spiderman' user account.
by xort
CVSS 7.2
CVE-2016-6563 EXPLOITDB CRITICAL ruby VERIFIED
D-Link DIR - Buffer Overflow
Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.
by Metasploit
CVSS 9.8
CVE-2025-34107 EXPLOITDB HIGH ruby VERIFIED
WinaXe FTP Client <7.7 - Buffer Overflow
A buffer overflow vulnerability exists in the WinaXe FTP Client version 7.7 within the FTP banner parsing functionality, WCMDPA10.dll. When the client connects to a remote FTP server and receives an overly long '220 Server Ready' response, the vulnerable component responsible for parsing the banner overflows a stack buffer, leading to arbitrary code execution under the context of the user.
by Metasploit
EIP-2026-118475 EXPLOITDB ruby VERIFIED
Easy Internet Sharing Proxy Server 2.2 - Remote Overflow (SEH) (Metasploit)
by Tracy Turben
EIP-2026-118409 EXPLOITDB ruby VERIFIED
Disk Pulse Enterprise 9.0.34 - 'Login' Remote Buffer Overflow (Metasploit)
by Metasploit
CVE-2016-4557 EXPLOITDB HIGH ruby VERIFIED
Linux BPF doubleput UAF Privilege Escalation
The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
by Metasploit
CVSS 7.8
EIP-2026-103349 EXPLOITDB ruby
Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit)
by Kenzo
CVE-2015-8660 EXPLOITDB MEDIUM ruby VERIFIED
Overlayfs Privilege Escalation
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.
by Metasploit
CVSS 6.7
CVE-2014-7205 EXPLOITDB ruby VERIFIED
hapi Server Framework - Code Injection
Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors.
by Metasploit