Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2012-10033 EXPLOITDB CRITICAL ruby VERIFIED
Narcissus - RCE
Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context.
by Metasploit
CVE-2012-4959 EXPLOITDB ruby VERIFIED
Novell File Reporter <1.0.2 - Path Traversal
Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote attackers to upload and execute files via a 130 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.
by Metasploit
CVE-2010-3600 EXPLOITDB ruby VERIFIED
Oracle Database Server <11.2.0.1 - Info Disclosure
Unspecified vulnerability in the Client System Analyzer component in Oracle Database Server 11.1.0.7 and 11.2.0.1 and Enterprise Manager Grid Control 10.2.0.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that this issue involves an exposed JSP script that accepts XML uploads in conjunction with NULL bytes in an unspecified parameter that allow execution of arbitrary code.
by Metasploit
EIP-2026-118707 EXPLOITDB ruby VERIFIED
Jira Scriptrunner 2.0.7 - Cross-Site Request Forgery / Remote Code Execution (Metasploit)
by Ben Sheppard
CVE-2012-5692 EXPLOITDB ruby VERIFIED
Invision Power Board <3.3.x - Unknown Vuln
Unspecified vulnerability in admin/sources/base/core.php in Invision Power Board (aka IPB or IP.Board) 3.1.x through 3.3.x has unknown impact and remote attack vectors.
by Metasploit
CVE-2012-5076 EXPLOITDB CRITICAL ruby VERIFIED
Java Applet AverageRangeStatisticImpl Remote Code Execution
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
by Metasploit
CVSS 9.8
EIP-2026-119286 EXPLOITDB ruby VERIFIED
WinRM - VBS Remote Code Execution (Metasploit)
by Metasploit
CVE-2012-2288 EXPLOITDB ruby VERIFIED
EMC Networker - Format String Vulnerability
Format string vulnerability in the nsrd RPC service in EMC NetWorker 7.6.3 and 7.6.4 before 7.6.4.1, and 8.0 before 8.0.0.1, allows remote attackers to execute arbitrary code via format string specifiers in a message.
by Metasploit
EIP-2026-118646 EXPLOITDB ruby VERIFIED
HP Intelligent Management Center UAM - Remote Buffer Overflow (Metasploit)
by Metasploit
EIP-2026-118245 EXPLOITDB ruby VERIFIED
Aladdin Knowledge System Ltd - 'ChooseFilePath' Remote Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-2020 EXPLOITDB ruby VERIFIED
HP Operations Agent <11.03.12 - RCE
Unspecified vulnerability in HP Operations Agent before 11.03.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1326.
by Metasploit
CVE-2012-2019 EXPLOITDB ruby VERIFIED
HP Operations Agent <11.03.12 - RCE
Unspecified vulnerability in HP Operations Agent before 11.03.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1325.
by Metasploit
EIP-2026-115390 EXPLOITDB ruby VERIFIED
hMAilServer 5.3.3 - IMAP Remote Crash (PoC)
by John Smith
EIP-2026-103979 EXPLOITDB ruby VERIFIED
ManageEngine Security Manager Plus 5.5 build 5505 - SQL Injection (Metasploit)
by Metasploit
CVE-2012-10035 EXPLOITDB CRITICAL ruby VERIFIED
Turbo FTP Server <1.30.823-1.30.826 - Buffer Overflow
Turbo FTP Server versions 1.30.823 and 1.30.826 contain a buffer overflow vulnerability in the handling of the PORT command. By sending a specially crafted payload, an unauthenticated remote attacker can overwrite memory structures and execute arbitrary code with SYSTEM privileges.
by Metasploit
EIP-2026-118759 EXPLOITDB ruby VERIFIED
ManageEngine Security Manager Plus 5.5 build 5505 - Remote SYSTEM SQL Injection (Metasploit)
by xistence
CVE-2012-10036 EXPLOITDB CRITICAL ruby VERIFIED
Project Pier <0.8.8 - Unauthenticated RCE
Project Pier 0.8.8 and earlier contains an unauthenticated arbitrary file upload vulnerability in tools/upload_file.php. The upload handler fails to validate the file type or enforce authentication, allowing remote attackers to upload malicious PHP files directly into a web-accessible directory. The uploaded file is stored with a predictable suffix and can be executed by requesting its URL, resulting in remote code execution.
by Metasploit
CVE-2010-10013 EXPLOITDB CRITICAL ruby VERIFIED
AjaXplorer <2.6 - RCE
An unauthenticated remote command execution vulnerability exists in AjaXplorer (now known as Pydio Cells) versions prior to 2.6. The flaw resides in the checkInstall.php script within the access.ssh plugin, which fails to properly sanitize user-supplied input to the destServer GET parameter. By injecting shell metacharacters, remote attackers can execute arbitrary system commands on the server with the privileges of the web server process.
by Metasploit
EIP-2026-117522 EXPLOITDB ruby VERIFIED
Microsoft Windows - Escalate Service Permissions Privilege Escalation (Metasploit)
by Metasploit
EIP-2026-103982 EXPLOITDB ruby VERIFIED
Metasploit < 4.4 - pcap_log Plugin Privilege Escalation (Metasploit)
by 0a29406d9794e4f9b30b3c5d6702c708
CVE-2012-2516 EXPLOITDB ruby VERIFIED
GE Intelligent Platforms - Command Injection
An ActiveX control in KeyHelp.ocx in KeyWorks KeyHelp Module (aka the HTML Help component), as used in GE Intelligent Platforms Proficy Historian 3.1, 3.5, 4.0, and 4.5; Proficy HMI/SCADA iFIX 5.0 and 5.1; Proficy Pulse 1.0; Proficy Batch Execution 5.6; SI7 I/O Driver 7.20 through 7.42; and other products, allows remote attackers to execute arbitrary commands via crafted input, related to a "command injection vulnerability."
by Metasploit
CVE-2012-10039 EXPLOITDB CRITICAL ruby VERIFIED
ZEN Load Balancer <3.0-rc1 - Command Injection
ZEN Load Balancer versions 2.0 and 3.0-rc1 contain a command injection vulnerability in content2-2.cgi. The filelog parameter is passed directly into a backtick-delimited exec() call without sanitation. An authenticated attacker can inject arbitrary shell commands, resulting in remote code execution as the root user. ZEN Load Balancer is the predecessor of ZEVENET and SKUDONET. The affected versions (2.0 and 3.0-rc1) are no longer supported. SKUDONET CE is the current community-maintained successor.
by Metasploit
CVE-2012-10038 EXPLOITDB CRITICAL ruby VERIFIED
Auxilium RateMyPet - RCE
Auxilium RateMyPet contains an unauthenticated arbitrary file upload vulnerability in upload_banners.php. The banner upload feature fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files. These files are stored in a web-accessible /banners/ directory and can be executed directly, resulting in remote code execution.
by Metasploit
CVE-2012-10037 EXPLOITDB CRITICAL ruby VERIFIED
PhpTax 0.8 - RCE
PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required.
by Metasploit
CVE-2012-0267 EXPLOITDB ruby VERIFIED
NTR ActiveX <2.0.4.8 - RCE
The StopModule method in the NTR ActiveX control before 2.0.4.8 allows remote attackers to execute arbitrary code via a crafted lModule parameter that triggers use of an arbitrary memory address as a function pointer.
by Metasploit