Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-118867 EXPLOITDB ruby VERIFIED
Microsoft SQL Server - Database Link Crawling Command Execution (Metasploit)
by Metasploit
CVE-2012-2174 EXPLOITDB ruby VERIFIED
IBM Lotus Notes - Code Injection
The URL handler in IBM Lotus Notes 8.x before 8.5.3 FP2 allows remote attackers to execute arbitrary code via a crafted notes:// URL.
by Metasploit
CVE-2012-10028 EXPLOITDB HIGH ruby VERIFIED
Netwin SurgeFTP <23c8 - Command Injection
Netwin SurgeFTP version 23c8 and prior contains a vulnerability in its web-based administrative console that allows authenticated users to execute arbitrary system commands via crafted POST requests to `surgeftpmgr.cgi`. This can lead to full remote code execution on the underlying system.
by Metasploit
CVE-2012-6329 EXPLOITDB ruby VERIFIED
TWiki MAKETEXT Remote Command Execution
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
by Metasploit
CVE-2012-6330 EXPLOITDB ruby VERIFIED
Foswiki MAKETEXT Remote Command Execution
The localization functionality in TWiki before 5.1.3, and Foswiki 1.0.x through 1.0.10 and 1.1.x through 1.1.6, allows remote attackers to cause a denial of service (memory consumption) via a large integer in a %MAKETEXT% macro.
by Metasploit
CVE-2012-6636 EXPLOITDB ruby VERIFIED
Google Android API < 16.0 - Access Control
The Android API before 17 does not properly restrict the WebView.addJavascriptInterface method, which allows remote attackers to execute arbitrary methods of Java objects by using the Java Reflection API within crafted JavaScript code that is loaded into the WebView component in an application targeted to API level 16 or earlier, a related issue to CVE-2013-4710.
by Metasploit
CVE-2012-10028 EXPLOITDB HIGH ruby VERIFIED
Netwin SurgeFTP <23c8 - Command Injection
Netwin SurgeFTP version 23c8 and prior contains a vulnerability in its web-based administrative console that allows authenticated users to execute arbitrary system commands via crafted POST requests to `surgeftpmgr.cgi`. This can lead to full remote code execution on the underlying system.
by Spencer McIntyre
CVE-2011-0340 EXPLOITDB ruby VERIFIED
Advantech Studio < 7.0 - Memory Corruption
Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.
by Metasploit
CVE-2010-2590 EXPLOITDB ruby VERIFIED
SAP Crystal Reports - Memory Corruption
Heap-based buffer overflow in the CrystalReports12.CrystalPrintControl.1 ActiveX control in PrintControl.dll 12.3.2.753 in SAP Crystal Reports 2008 SP3 Fix Pack 3.2 allows remote attackers to execute arbitrary code via a long ServerResourceVersion property value.
by Metasploit
CVE-2010-3007 EXPLOITDB ruby VERIFIED
HP Data Protector <4.0 - Privilege Escalation/DoS
Unspecified vulnerability in HP Data Protector Express, and Data Protector Express Single Server Edition (SSE), 3.x before build 56936 and 4.x before build 56906 allows local users to gain privileges or cause a denial of service via unknown vectors.
by Metasploit
CVE-2012-10032 EXPLOITDB HIGH ruby VERIFIED
Maxthon3 <3.3 - XSS
Maxthon3 versions prior to 3.3 are vulnerable to cross context scripting (XCS) via the about:history page. The browser’s trusted zone improperly handles injected script content, allowing attackers to execute arbitrary JavaScript in a privileged context. This flaw enables modification of browser configuration and execution of arbitrary code through Maxthon’s exposed DOM APIs, including maxthon.program.Program.launch() and maxthon.io.writeDataURL(). Exploitation requires user interaction, typically by visiting a malicious webpage that triggers the injection.
by Metasploit
CVE-2012-10030 EXPLOITDB CRITICAL ruby VERIFIED
FreeFloat FTP Server - Unauthenticated RCE
FreeFloat FTP Server contains multiple critical design flaws that allow unauthenticated remote attackers to upload arbitrary files to sensitive system directories. The server accepts empty credentials, defaults user access to the root of the C:\ drive, and imposes no restrictions on file type or destination path. These conditions enable attackers to upload executable payloads and .mof files to locations such as system32 and wbem\mof, where Windows Management Instrumentation (WMI) automatically processes and executes them. This results in remote code execution with SYSTEM-level privileges, without requiring user interaction.
by Metasploit
CVSS 9.8
CVE-2012-10029 EXPLOITDB HIGH ruby VERIFIED
Nagios XI Network Monitor <1.3 - Command Injection
Nagios XI Network Monitor prior to Graph Explorer component version 1.3 contains a command injection vulnerability in `visApi.php`. An authenticated user can inject system commands via unsanitized parameters such as `host`, resulting in remote code execution.
by Metasploit
EIP-2026-104086 EXPLOITDB ruby VERIFIED
Splunk 5.0 - Custom App Remote Code Execution (Metasploit)
by Metasploit
CVE-2009-0880 EXPLOITDB ruby VERIFIED
IBM Director < 5.20.3 - Path Traversal
Directory traversal vulnerability in the CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to load and execute arbitrary local DLL code via a .. (dot dot) in a /CIMListener/ URI in an M-POST request.
by Metasploit
CVE-2012-5613 EXPLOITDB ruby VERIFIED
MySQL <5.5.19 & MariaDB <5.5.28a - Privilege Escalation
MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
by Metasploit
EIP-2026-103838 EXPLOITDB ruby VERIFIED
Adobe IndesignServer 5.5 - SOAP Server Arbitrary Script Execution (Metasploit)
by Metasploit
CVE-2012-5357 EXPLOITDB CRITICAL ruby VERIFIED
Ektron CMS <8.02 SP5 - RCE
Ektron Content Management System (CMS) before 8.02 SP5 uses the XslCompiledTransform class with enablescript set to true, which allows remote attackers to execute arbitrary code with NETWORK SERVICE privileges via crafted XSL data.
by Metasploit
CVSS 9.8
CVE-2012-5975 EXPLOITDB ruby VERIFIED
SSH Tectia Server - Authentication Bypass
The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
by Metasploit
CVE-2012-10031 EXPLOITDB HIGH ruby VERIFIED
BlazeVideo HDTV Player Pro v6.6.0.3 - Buffer Overflow
BlazeVideo HDTV Player Pro v6.6.0.3 is vulnerable to a stack-based buffer overflow due to improper handling of user-supplied input embedded in .plf playlist files. When parsing a crafted .plf file, the MediaPlayerCtrl.dll component invokes PathFindFileNameA() to extract a filename from a URL-like string. The returned value is then copied to a fixed-size stack buffer using an inline strcpy call without bounds checking. If the input exceeds the buffer size, this leads to a stack overflow and potential arbitrary code execution under the context of the user.
by Metasploit
EIP-2026-117519 EXPLOITDB ruby VERIFIED
Microsoft Windows - AlwaysInstallElevated MSI (Metasploit)
by Metasploit
EIP-2026-104743 EXPLOITDB ruby VERIFIED
Network Shutdown Module 3.21 - 'sort_values' Remote PHP Code Injection (Metasploit)
by Metasploit
CVE-2012-3753 EXPLOITDB ruby VERIFIED
Apple Quicktime < 7.7.2 - Memory Corruption
Buffer overflow in the plugin in Apple QuickTime before 7.7.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MIME type.
by Metasploit
CVE-2012-3752 EXPLOITDB ruby VERIFIED
Apple Quicktime < 7.7.2 - Memory Corruption
Multiple buffer overflows in Apple QuickTime before 7.7.3 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted style element in a QuickTime TeXML file.
by Metasploit
CVE-2012-5932 EXPLOITDB ruby VERIFIED
Microfocus Privileged User Manager - Code Injection
Eval injection vulnerability in the ldapagnt_eval function in ldapagnt.dll in unifid.exe in NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 allows remote attackers to execute arbitrary Perl code via a crafted application/x-amf request.
by Metasploit