Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2015-2426 EXPLOITDB HIGH ruby VERIFIED
Windows Adobe Type Manager Library - RCE
Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "OpenType Font Driver Vulnerability."
by Metasploit
CVSS 8.8
CVE-2015-2433 EXPLOITDB ruby VERIFIED
Microsoft Windows 10 - Information Disclosure
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to bypass the ASLR protection mechanism via a crafted application, aka "Kernel ASLR Bypass Vulnerability."
by Metasploit
CVE-2015-7766 EXPLOITDB ruby VERIFIED
ZOHO ManageEngine OpManager <11.6 - Auth Bypass
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."
by Metasploit
CVE-2015-2509 EXPLOITDB ruby VERIFIED
Microsoft Windows 7 - Improper Access Control
Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted Media Center link (mcl) file, aka "Windows Media Center RCE Vulnerability."
by Metasploit
CVE-2015-7309 EXPLOITDB ruby VERIFIED
Bolt < 2.2.0 - Injection
The theme editor in Bolt before 2.2.5 does not check the file extension when renaming files, which allows remote authenticated users to execute arbitrary code by renaming a crafted file and then directly accessing it.
by Metasploit
CVE-2015-5082 EXPLOITDB ruby VERIFIED
Endian Firewall < 2.5.1 - Command Injection
Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi.
by Metasploit
EIP-2026-114526 EXPLOITDB ruby VERIFIED
YesWiki 0.2 - 'squelette' Directory Traversal
by HaHwul
CVE-2015-3673 EXPLOITDB ruby VERIFIED
Apple OS X Entitlements Rootpipe Privilege Escalation
Admin Framework in Apple OS X before 10.10.4 does not properly restrict the location of writeconfig clients, which allows local users to obtain root privileges by moving and then modifying Directory Utility.
by Metasploit
CVE-2015-0802 EXPLOITDB ruby VERIFIED
Firefox PDF.js Privileged Javascript Injection
Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
by Metasploit
CVE-2015-0816 EXPLOITDB ruby VERIFIED
Mozilla Firefox < 31.5.3 - Access Control
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
by Metasploit
CVE-2015-1487 EXPLOITDB ruby VERIFIED
Symantec Endpoint Protection Manager <12.1-RU6-MP1 - Privilege Esca...
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to write to arbitrary files, and consequently obtain administrator privileges, via a crafted filename.
by Metasploit
CVE-2015-1486 EXPLOITDB ruby VERIFIED
Symantec Endpoint Protection Manager <12.1-RU6-MP1 - Auth Bypass
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote attackers to bypass authentication via a crafted password-reset action that triggers a new administrative session.
by Metasploit
CVE-2015-1489 EXPLOITDB ruby VERIFIED
Symantec Endpoint Protection Manager <12.1-RU6-MP1 - Privilege Esca...
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to gain privileges via unspecified vectors.
by Metasploit
EIP-2026-118056 EXPLOITDB ruby VERIFIED
VideoCharge Studio - Local Buffer Overflow (SEH) (Metasploit)
by Metasploit
EIP-2026-114674 EXPLOITDB ruby VERIFIED
Werkzeug - Debug Shell Command Execution (Metasploit)
by Metasploit
CVE-2025-34106 EXPLOITDB HIGH ruby VERIFIED
PDF Shaper <3.6 - Buffer Overflow
A buffer overflow vulnerability exists in PDF Shaper versions 3.5 and 3.6 when converting a crafted PDF file to an image using the 'Convert PDF to Image' functionality. An attacker can exploit this vulnerability by tricking a user into opening a maliciously crafted PDF file, leading to arbitrary code execution under the context of the user. This vulnerability has been verified on Windows XP, 7, 8, and 10 platforms using the PDFTools.exe component.
by metacom
EIP-2026-117267 EXPLOITDB ruby VERIFIED
Heroes of Might and Magic III - '.h3m' Map file Buffer Overflow (Metasploit)
by Metasploit
CVE-2015-2995 EXPLOITDB ruby VERIFIED
SysAid Help Desk <15.2 - RCE
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
by Metasploit
CVE-2025-34125 EXPLOITDB CRITICAL ruby VERIFIED
D-Link DSP-W110A1 <1.05B01 - Command Injection
An unauthenticated command injection vulnerability exists in the cookie handling process of the lighttpd web server on D-Link DSP-W110A1 firmware version 1.05B01. This occurs when specially crafted cookie values are processed, allowing remote attackers to execute arbitrary commands on the underlying Linux operating system. Successful exploitation enables full system compromise.
by Metasploit
CVE-2015-5122 EXPLOITDB CRITICAL ruby VERIFIED
Adobe Flash opaqueBackground Use After Free
Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
by Metasploit
CVSS 9.8
CVE-2015-7709 EXPLOITDB ruby VERIFIED
Western Digital Arkeia <11.0.12 - Command Injection
The arkeiad daemon in the Arkeia Backup Agent in Western Digital Arkeia 11.0.12 and earlier allows remote attackers to bypass authentication and execute arbitrary commands via a series of crafted requests involving the ARKFS_EXEC_CMD operation.
by Metasploit
EIP-2026-104121 EXPLOITDB ruby VERIFIED
VNC Keyboard - Remote Code Execution (Metasploit)
by Metasploit
CVE-2015-2857 EXPLOITDB CRITICAL ruby VERIFIED
Accellion File Transfer Appliance < 9_11_200 - Command Injection
Accellion File Transfer Appliance before FTA_9_11_210 allows remote attackers to execute arbitrary code via shell metacharacters in the oauth_token parameter.
by Metasploit
CVSS 9.8
CVE-2015-3043 EXPLOITDB CRITICAL ruby VERIFIED
Adobe Flash Player <14.x - Memory Corruption
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.
by Metasploit
CVSS 9.8
CVE-2015-3113 EXPLOITDB CRITICAL ruby VERIFIED
Adobe Flash Player Nellymoser Audio Decoding Buffer Overflow
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015.
by Metasploit
CVSS 9.8