Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2014-0569 EXPLOITDB ruby VERIFIED
Adobe Flash Player < 11.2.202.406 - Integer Overflow
Integer overflow in Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allows attackers to execute arbitrary code via unspecified vectors.
by Metasploit
CVE-2015-1130 EXPLOITDB HIGH ruby VERIFIED
Apple OS X Rootpipe Privilege Escalation
The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors.
by Metasploit
CVSS 7.8
CVE-2015-2219 EXPLOITDB ruby VERIFIED
Lenovo System Update < 5.06.0027 - Access Control
Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 uses predictable security tokens, which allows local users to gain privileges by sending a valid token with a command to the System Update service (SUService.exe) through an unspecified named pipe.
by Metasploit
EIP-2026-103074 EXPLOITDB ruby
Barracuda Firmware 5.0.0.012 - (Authenticated) Remote Command Execution (Metasploit)
by xort
CVE-2015-2284 EXPLOITDB ruby VERIFIED
Solarwinds Firewall Security Manager < 6.6.5 - Access Control
userlogin.jsp in SolarWinds Firewall Security Manager (FSM) before 6.6.5 HotFix1 allows remote attackers to gain privileges and execute arbitrary code via unspecified vectors, related to client session handling.
by Metasploit
CVE-2010-1871 EXPLOITDB HIGH ruby VERIFIED
JBoss Seam 2 - RCE
JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.
by Metasploit
CVSS 8.8
CVE-2015-0936 EXPLOITDB CRITICAL ruby VERIFIED
Ceragon FibeAir IP-10 - Privilege Escalation
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
by Metasploit
CVSS 9.8
CVE-2015-2223 EXPLOITDB ruby
Palo Alto Networks Traps - XSS
Multiple cross-site scripting (XSS) vulnerabilities in the web-based console management interface in Palo Alto Networks Traps (formerly Cyvera Endpoint Protection) 3.1.2.1546 allow remote attackers to inject arbitrary web script or HTML via the (1) Arguments, (2) FileName, or (3) URL parameter in a SOAP request.
by Michael Hendrickx
CVE-2015-0313 EXPLOITDB CRITICAL ruby VERIFIED
Adobe Flash Player < 11.2.202.442 - Use After Free
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.
by Metasploit
CVSS 9.8
CVE-2014-7910 EXPLOITDB ruby
Google Chrome < 39.0.2171.45 - Denial of Service
Multiple unspecified vulnerabilities in Google Chrome before 39.0.2171.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
by Patrick Pellegrino
CVE-2014-7910 EXPLOITDB ruby
Google Chrome < 39.0.2171.45 - Denial of Service
Multiple unspecified vulnerabilities in Google Chrome before 39.0.2171.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
by Patrick Pellegrino
CVE-2014-8636 EXPLOITDB ruby VERIFIED
Mozilla Firefox <35.0 - XSS
The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.
by Metasploit
CVE-2014-0980 EXPLOITDB ruby VERIFIED
Publish-It PUI Buffer Overflow (SEH)
Buffer overflow in Poster Software PUBLISH-iT 3.6d allows remote attackers to execute arbitrary code via a crafted PUI file.
by Metasploit
CVE-2014-7236 EXPLOITDB CRITICAL ruby VERIFIED
TWiki Debugenableplugins Remote Code Execution
Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki before 6.0.1 allows remote attackers to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome.
by Metasploit
CVSS 9.1
CVE-2015-0235 EXPLOITDB ruby VERIFIED
Exim GHOST (glibc gethostbyname) Buffer Overflow
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
by Qualys Corporation
CVE-2015-0318 EXPLOITDB ruby VERIFIED
Adobe Flash Player < 13.0.0.264 - Denial of Service
Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
by Metasploit
CVE-2015-0925 EXPLOITDB ruby VERIFIED
Ipass Open Mobile < 2.4.4 - Code Injection
The client in iPass Open Mobile before 2.4.5 on Windows allows remote authenticated users to execute arbitrary code via a DLL pathname in a crafted Unicode string that is improperly handled by a subprocess reached through a named pipe, as demonstrated by a UNC share pathname.
by Metasploit
CVE-2015-1427 EXPLOITDB CRITICAL ruby VERIFIED
Elasticsearch <1.3.8, <1.4.3 - Command Injection
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
by Metasploit
CVSS 9.8
CVE-2015-0311 EXPLOITDB CRITICAL ruby VERIFIED
Adobe Flash Player ByteArray UncompressViaZlibVariant Use After Free
Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.
by Metasploit
CVSS 9.8
CVE-2014-2623 EXPLOITDB ruby VERIFIED
HP Storage Data Protector <8 - RCE
Unspecified vulnerability in HP Storage Data Protector 8.x allows remote attackers to execute arbitrary code via unknown vectors.
by Metasploit
CVE-2014-8687 EXPLOITDB CRITICAL ruby VERIFIED
Seagate Business NAS <2015.00322 - RCE
Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens.
by Metasploit
CVSS 9.8
CVE-2014-8686 EXPLOITDB CRITICAL ruby VERIFIED
CodeIgniter <2.2.0 - Info Disclosure
CodeIgniter before 2.2.0 makes it easier for attackers to decode session cookies by leveraging fallback to a custom XOR-based encryption scheme when the Mcrypt extension for PHP is not available.
by Metasploit
CVSS 9.8
CVE-2014-7285 EXPLOITDB ruby VERIFIED
Symantec Web Gateway <5.2.2 - Command Injection
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.
by Metasploit
CVE-2015-1497 EXPLOITDB ruby
Persistent Systems Radia Client Automation <9.1 - RCE
radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
by Ben Turner
CVE-2015-1187 EXPLOITDB CRITICAL ruby VERIFIED
D-Link Routers - Remote Code Execution via ping.ccp
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
by Metasploit
CVSS 9.8