Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2014-125118 EXPLOITDB CRITICAL ruby VERIFIED
eScan Web Management Console <5.5-2 - Command Injection
A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The application fails to properly sanitize the 'pass' parameter when processing login requests to login.php, allowing an authenticated attacker with a valid username to inject arbitrary commands via a specially crafted password value. Successful exploitation results in remote code execution. Privilege escalation to root is possible by abusing the runasroot utility with mwconf-level privileges.
by Metasploit
CVE-2014-2849 EXPLOITDB ruby VERIFIED
Sophos Web Appliance Firmware < 3.8.1.1 - Access Control
The Change Password dialog box (change_password) in Sophos Web Appliance before 3.8.2 allows remote authenticated users to change the admin user password via a crafted request.
by Metasploit
CVE-2014-1761 EXPLOITDB HIGH ruby VERIFIED
Microsoft Word <2013 - Memory Corruption
Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
by Metasploit
CVSS 7.8
CVE-2014-2850 EXPLOITDB ruby VERIFIED
Sophos Web Appliance Firmware < 3.8.1.1 - OS Command Injection
The network interface configuration page (netinterface) in Sophos Web Appliance before 3.8.2 allows remote administrators to execute arbitrary commands via shell metacharacters in the address parameter.
by Metasploit
CVE-2014-2268 EXPLOITDB ruby VERIFIED
vTiger 6.0 - RCE
views/Index.php in the Install module in vTiger 6.0 before Security Patch 2 does not properly restrict access, which allows remote attackers to re-install the application via a request that sets the X-Requested-With HTTP header, as demonstrated by executing arbitrary PHP code via the db_name parameter.
by Metasploit
EIP-2026-118130 EXPLOITDB ruby VERIFIED
WinRAR - Filename Spoofing (Metasploit)
by Metasploit
EIP-2026-101286 EXPLOITDB ruby VERIFIED
Fritz!Box Webcm - Command Injection (Metasploit)
by Metasploit
CVE-2014-2314 EXPLOITDB ruby VERIFIED
Atlassian JIRA <6.0.4 - Path Traversal
Directory traversal vulnerability in the Issue Collector plugin in Atlassian JIRA before 6.0.4 allows remote attackers to create arbitrary files via unspecified vectors.
by Metasploit
CVE-2013-4011 EXPLOITDB ruby VERIFIED
IBM AIX 6.1/7.1 & VIOS 2.2.2.2-FP-26 SP-02 - Privilege Escalation
Multiple unspecified vulnerabilities in the InfiniBand subsystem in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, allow local users to gain privileges via vectors involving (1) arp.ib or (2) ibstat.
by Metasploit
CVE-2008-5191 EXPLOITDB ruby VERIFIED
SePortal 2.4 - SQL Injection
Multiple SQL injection vulnerabilities in SePortal 2.4 allow remote attackers to execute arbitrary SQL commands via the (1) poll_id parameter to poll.php and the (2) sp_id parameter to staticpages.php.
by Metasploit
CVE-2014-1216 EXPLOITDB ruby VERIFIED
FitNesse Wiki <20140201 - Command Injection
FitNesse Wiki 20131110, 20140201, and earlier allows remote attackers to execute arbitrary commands by defining a COMMAND_PATTERN and TEST_RUNNER in the pageContent parameter when editing a page.
by SecPod Research
CVE-2013-2143 EXPLOITDB ruby VERIFIED
Redhat Network Satellite < 1.5.0-14 - Improper Input Validation
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.
by Metasploit
CVE-2014-1903 EXPLOITDB ruby VERIFIED
FreePBX <2.9.0.14, <2.10.1.15, <2.11.0.23, <12.0.1alpha22 - RCE
admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.
by Metasploit
CVE-2014-125121 EXPLOITDB CRITICAL ruby VERIFIED
Array Networks vAPV/vxAG <8.3.2.17-9.2.0.34 - Privilege Escalation
Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The devices ship with a default SSH login or a hardcoded DSA private key, allowing an attacker to authenticate remotely with limited privileges. Once authenticated, an attacker can overwrite the world-writable /ca/bin/monitor.sh script with arbitrary commands. Since this script is executed with elevated privileges through the backend binary, enabling the debug monitor via backend -c "debug monitor on" triggers execution of the attacker's payload as root. This allows full system compromise.
by Metasploit
CVE-2014-0307 EXPLOITDB ruby VERIFIED
Microsoft Internet Explorer 9 - Use After Free
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a certain sequence of manipulations of a TextRange element, aka "Internet Explorer Memory Corruption Vulnerability."
by Metasploit
CVE-2014-1691 EXPLOITDB ruby VERIFIED
Horde <5.1.1 - Code Injection
The framework/Util/lib/Horde/Variables.php script in the Util library in Horde before 5.1.1 allows remote attackers to conduct object injection attacks and execute arbitrary PHP code via a crafted serialized object in the _formvars form.
by Metasploit
EIP-2026-114804 EXPLOITDB ruby VERIFIED
Quantum vmPRO - Backdoor Command (Metasploit)
by Metasploit
EIP-2026-115332 EXPLOITDB ruby
Gold MP4 Player 3.3 - Universal (SEH) (Metasploit)
by Revin Hadi Saputra
CVE-2010-5299 EXPLOITDB ruby VERIFIED
MicroP 0.1.1.1600 - Buffer Overflow
Stack-based buffer overflow in MicroP 0.1.1.1600 allows remote attackers to execute arbitrary code via a crafted .mppl file. NOTE: it has been reported that the overflow is in the lpFileName parameter of the CreateFileA function, but the overflow is probably caused by a separate, unnamed function.
by Necmettin COSKUN
CVE-2014-0783 EXPLOITDB ruby VERIFIED
Yokogawa Centum CS 3000 < r3.09.50 - Memory Corruption
Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.
by Metasploit
CVE-2014-0784 EXPLOITDB ruby VERIFIED
Yokogawa Centum CS 3000 < r3.09.50 - Memory Corruption
Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.
by Metasploit
CVE-2014-100015 EXPLOITDB ruby VERIFIED
Solidworks Product Data Management - Path Traversal
Directory traversal vulnerability in pdmwService.exe in SolidWorks Workgroup PDM 2014 allows remote attackers to write to arbitrary files via a .. (dot dot) in the filename in a file upload.
by Metasploit
CVE-2013-2347 EXPLOITDB ruby VERIFIED
HP Storage Data Protector - Denial of Service
The Backup Client Service (OmniInet.exe) in HP Storage Data Protector 6.2X allows remote attackers to execute arbitrary commands or cause a denial of service via a crafted EXEC_BAR packet to TCP port 5555, aka ZDI-CAN-1885.
by Metasploit
CVE-2014-0114 EXPLOITDB ruby VERIFIED
Apache Commons BeanUtils <1.9.2 - RCE
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
by Metasploit
CVE-2013-7409 EXPLOITDB ruby VERIFIED
ALLPlayer <5.8.1 - Buffer Overflow
Buffer overflow in ALLPlayer 5.6.2 through 5.8.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .m3u (playlist) file.
by Metasploit