Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2005-0575 EXPLOITDB ruby VERIFIED
Stormy Studios Knet - Buffer Overflow
Buffer overflow in Stormy Studios Knet 1.04c and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP GET request.
by Myo Soe
CVE-2013-1493 EXPLOITDB ruby VERIFIED
Oracle Jre < 1.7.0 - Memory Corruption
The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
by Metasploit
EIP-2026-104779 EXPLOITDB ruby VERIFIED
STUNSHELL (Web Shell) - Remote Code Execution (Metasploit)
by Metasploit
EIP-2026-104778 EXPLOITDB ruby VERIFIED
STUNSHELL (Web Shell) - Remote Code Execution (Metasploit)
by Metasploit
EIP-2026-104777 EXPLOITDB ruby VERIFIED
STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit)
by Metasploit
EIP-2026-104776 EXPLOITDB ruby VERIFIED
STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit)
by Metasploit
EIP-2026-104115 EXPLOITDB ruby VERIFIED
v0pCr3w (Web Shell) - Remote Code Execution (Metasploit)
by Metasploit
EIP-2026-104114 EXPLOITDB ruby VERIFIED
v0pCr3w (Web Shell) - Remote Code Execution (Metasploit)
by Metasploit
CVE-2012-5201 EXPLOITDB ruby VERIFIED
HP iMC <5.2 E0401 - RCE
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1611.
by Metasploit
EIP-2026-118229 EXPLOITDB ruby VERIFIED
ActFax 5.01 - RAW Server Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-4711 EXPLOITDB ruby VERIFIED
KingView <6.52-6.55 - Buffer Overflow
Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet.
by Metasploit
EIP-2026-111659 EXPLOITDB ruby
Ra1NX PHP Bot - pubcall Authentication Bypass Remote Code Execution (Metasploit)
by bwall
CVE-2012-3001 EXPLOITDB ruby VERIFIED
Mutiny Standard <4.5-1.12 - Command Injection
Mutiny Standard before 4.5-1.12 allows remote attackers to execute arbitrary commands via the network-interface menu, related to a "command injection vulnerability."
by Metasploit
EIP-2026-119103 EXPLOITDB ruby VERIFIED
Sami FTP Server - 'LIST' Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-4914 EXPLOITDB ruby VERIFIED
CoolPDF 3.0.2.256 - Buffer Overflow
Stack-based buffer overflow in the reader in CoolPDF 3.0.2.256 allows remote attackers to execute arbitrary code via a PDF document with a crafted stream.
by Metasploit
EIP-2026-113829 EXPLOITDB ruby
WordPress Plugin IndiaNIC FAQs Manager 1.0 - Blind SQL Injection
by m3tamantra
CVE-2011-3923 EXPLOITDB CRITICAL ruby VERIFIED
Apache Struts <2.3.1.2 - Command Injection
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
by Metasploit
CVSS 9.8
EIP-2026-113662 EXPLOITDB ruby VERIFIED
WordPress Plugin Count Per Day 3.2.5 - 'counter.php' Cross-Site Scripting
by m3tamantra
CVE-2013-1852 EXPLOITDB ruby
Kolja Schleich Leaguemanager < 3.8 - SQL Injection
SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php.
by Joshua Reynolds
CVE-2013-0108 EXPLOITDB ruby VERIFIED
Honeywell Enterprise Buildings Integrator - Code Injection
An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R400.2, R410.1, and R410.2; SymmetrE R310, R410.1, and R410.2; ComfortPoint Open Manager (aka CPO-M) Station R100; and HMIWeb Browser client packages allows remote attackers to execute arbitrary code via a crafted HTML document.
by Metasploit
CVE-2013-0074 EXPLOITDB HIGH ruby VERIFIED
Microsoft Silverlight <5.1.20125.0 - RCE
Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."
by Metasploit
CVSS 7.8
CVE-2012-4284 EXPLOITDB CRITICAL ruby VERIFIED
Sparklabs Viscosity - Privilege Escalation
A Privilege Escalation vulnerability exists in Viscosity 1.4.1 on Mac OS X due to a path name validation issue in the setuid-set ViscosityHelper binary, which could let a remote malicious user execute arbitrary code
by Metasploit
CVSS 9.8
CVE-2012-3485 EXPLOITDB ruby VERIFIED
Google Tunnelblick < 3.3beta20 - Improper Input Validation
Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.
by Metasploit
CVE-2013-10067 EXPLOITDB CRITICAL ruby VERIFIED
Glossword 1.8.8-1.8.12 - RCE
Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows users with administrator privileges to upload files to the gw_temp/a/ directory. Due to insufficient validation of file type and path, attackers can upload and execute PHP payloads, resulting in remote code execution.
by Metasploit
CVE-2013-10066 EXPLOITDB CRITICAL ruby VERIFIED
Kordil EDMS v2.2.60rc3 - Unauthenticated RCE
An unauthenticated arbitrary file upload vulnerability exists in Kordil EDMS v2.2.60rc3. The application exposes an upload endpoint (users_add.php) that allows attackers to upload files to the /userpictures/ directory without authentication. This flaw enables remote code execution by uploading a PHP payload and invoking it via a direct HTTP request.
by Metasploit