Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2013-2333 EXPLOITDB ruby VERIFIED
HP Storage Data Protector <7.01 - RCE
Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1680.
by Metasploit
CVE-2013-5743 EXPLOITDB CRITICAL ruby
Zabbix < 1.8.17 - SQL Injection
Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.
by Jason Kratzer
CVSS 9.8
CVE-2013-6366 EXPLOITDB ruby VERIFIED
Vmware Hyperic HQ - Code Injection
The Groovy script console in VMware Hyperic HQ 4.6.6 allows remote authenticated administrators to execute arbitrary code via a Runtime.getRuntime().exec call.
by Metasploit
CVE-2013-4800 EXPLOITDB ruby VERIFIED
HP LoadRunner <11.52 - RCE
Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1735.
by Metasploit
EIP-2026-114786 EXPLOITDB ruby VERIFIED
GestioIP - Remote Command Execution (Metasploit)
by Metasploit
EIP-2026-119132 EXPLOITDB ruby VERIFIED
SIEMENS Solid Edge ST4 SEListCtrlX - ActiveX Remote Code Execution (Metasploit)
by Metasploit
CVE-2013-3893 EXPLOITDB HIGH ruby VERIFIED
Microsoft Internet Explorer - Use After Free
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
by Metasploit
CVSS 8.8
EIP-2026-118584 EXPLOITDB ruby VERIFIED
freeFTPd 1.0.10 - 'PASS' Remote Buffer Overflow (Metasploit)
by Metasploit
CVE-2013-4660 EXPLOITDB ruby VERIFIED
JS-YAML <2.0.5 - RCE
The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
by Metasploit
CVE-2013-10049 EXPLOITDB CRITICAL ruby VERIFIED
Raidsonic NAS - Command Injection
An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.
by Metasploit
CVE-2013-0810 EXPLOITDB HIGH ruby VERIFIED
Microsoft Windows XP-SP3 - RCE
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, and Windows Server 2008 SP2 allow remote attackers to execute arbitrary code via a crafted screensaver in a theme file, aka "Windows Theme File Remote Code Execution Vulnerability."
by Metasploit
CVSS 8.1
CVE-2013-3205 EXPLOITDB ruby VERIFIED
Microsoft Internet Explorer <9 - Code Injection
Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
by Metasploit
CVE-2013-5696 EXPLOITDB ruby VERIFIED
Glpi < 0.84.1 - CSRF
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
by Metasploit
CVE-2013-3568 EXPLOITDB HIGH ruby VERIFIED
Cisco Linksys Wrt110 Firmware - CSRF
Cross-site request forgery (CSRF) vulnerability in Cisco Linksys WRT110 allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors.
by Metasploit
CVSS 8.8
CVE-2013-10044 EXPLOITDB HIGH ruby
OpenEMR < 4.1.1 Patch 14 - SQL Injection
An authenticated SQL injection vulnerability exists in OpenEMR ≤ 4.1.1 Patch 14 that allows a low-privileged attacker to extract administrator credentials and subsequently escalate privileges. Once elevated, the attacker can exploit an unrestricted file upload flaw to achieve remote code execution, resulting in full compromise of the application and its host system.
by xistence
CVSS 8.8
EIP-2026-104784 EXPLOITDB ruby VERIFIED
Western Digital Arkeia < 10.0.10 - Remote Code Execution (Metasploit)
by xistence
CVE-2013-10046 EXPLOITDB HIGH ruby VERIFIED
Agnitum Outpost Internet Security 8.1 - Privilege Escalation
A local privilege escalation vulnerability exists in Agnitum Outpost Internet Security 8.1 that allows an unprivileged user to execute arbitrary code with SYSTEM privileges. The flaw resides in the acs.exe component, which exposes a named pipe that accepts unauthenticated commands. By exploiting a directory traversal weakness in the pipe protocol, an attacker can instruct the service to load a malicious DLL from a user-controlled location. The DLL is then executed in the context of the privileged service.
by Metasploit
CVE-2013-4730 EXPLOITDB ruby
PCMan's FTP Server 2.0.7 - RCE
Buffer overflow in PCMan's FTP Server 2.0.7 allows remote attackers to execute arbitrary code via a long string in a USER command.
by Rick Flores
CVE-2013-4812 EXPLOITDB ruby VERIFIED
HP ProCurve Manager <4.0 - RCE
UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.
by Metasploit
CVE-2013-4811 EXPLOITDB ruby VERIFIED
HP ProCurve Manager <4.0 - RCE
UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.
by Metasploit
EIP-2026-114782 EXPLOITDB ruby VERIFIED
D-Link Devices - UPnP SOAP TelnetD Command Execution (Metasploit)
by Metasploit
CVE-2013-4983 EXPLOITDB ruby VERIFIED
Sophos Web Appliance <3.7.9.1, <3.8.1.1 - Command Injection
The get_referers function in /opt/ws/bin/sblistpack in Sophos Web Appliance before 3.7.9.1 and 3.8 before 3.8.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the domain parameter to end-user/index.php.
by Metasploit
CVE-2013-4984 EXPLOITDB ruby VERIFIED
Sophos Web Appliance <3.7.9.1, <3.8-3.8.1.1 - Privilege Escalation
The close_connections function in /opt/cma/bin/clear_keys.pl in Sophos Web Appliance before 3.7.9.1 and 3.8 before 3.8.1.1 allows local users to gain privileges via shell metacharacters in the second argument.
by Metasploit
CVE-2013-4015 EXPLOITDB ruby VERIFIED
Microsoft Internet Explorer - Access Control
Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
by Metasploit
CVE-2013-2367 EXPLOITDB ruby VERIFIED
HP SiteScope <11.21 - RCE
Multiple unspecified vulnerabilities in HP SiteScope 11.20 and 11.21, when SOAP is used, allow remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1678.
by Metasploit