Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2012-0266 EXPLOITDB ruby VERIFIED
NTR ActiveX <2.0.4.8 - RCE
Multiple stack-based buffer overflows in the NTR ActiveX control before 2.0.4.8 allow remote attackers to execute arbitrary code via (1) a long bstrUrl parameter to the StartModule method, (2) a long bstrParams parameter to the Check method, a long bstrUrl parameter to the (3) Download or (4) DownloadModule method during construction of a .ntr pathname, or a long bstrUrl parameter to the (5) Download or (6) DownloadModule method during construction of a URL.
by Metasploit
CVE-2012-4969 EXPLOITDB HIGH ruby VERIFIED
Microsoft Internet Explorer <10 - RCE
Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.
by Metasploit
CVSS 8.1
CVE-2011-4051 EXPLOITDB ruby VERIFIED
InduSoft Web Studio <7.0 - RCE
CEServer.exe in the CEServer component in the Remote Agent module in InduSoft Web Studio 6.1 and 7.0 does not require authentication, which allows remote attackers to execute arbitrary code via vectors related to creation of a file, loading a DLL, and process control.
by Metasploit
EIP-2026-118644 EXPLOITDB ruby VERIFIED
HP Application Lifecycle Management - 'XGO.ocx' ActiveX 'SetShapeNodeType()' Remote Code Execution (Metasploit)
by Metasploit
EIP-2026-118293 EXPLOITDB ruby VERIFIED
Avaya WinPMD UniteHostRouter - Remote Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-3811 EXPLOITDB ruby VERIFIED
Avaya IP Office Customer Call Reporter - Unrestricted File Upload
Unrestricted file upload vulnerability in ImageUpload.ashx in the Wallboard application in Avaya IP Office Customer Call Reporter 7.0 before 7.0.5.8 Q1 2012 Maintenance Release and 8.0 before 8.0.9.13 Q1 2012 Maintenance Release allows remote attackers to execute arbitrary code by uploading an executable file and then accessing it via a direct request.
by Metasploit
EIP-2026-117524 EXPLOITDB ruby VERIFIED
Microsoft Windows - Escalate UAC Protection Bypass (Metasploit)
by Metasploit
EIP-2026-117523 EXPLOITDB ruby VERIFIED
Microsoft Windows - Escalate UAC Execute RunAs (Metasploit)
by Metasploit
CVE-2011-2005 EXPLOITDB HIGH ruby VERIFIED
Microsoft Windows XP/Server 2003 - Privilege Escalation
afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
by Metasploit
CVSS 7.8
CVE-2012-2982 EXPLOITDB ruby VERIFIED
Webmin <1.590 - Command Injection
file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary commands via an invalid character in a pathname, as demonstrated by a | (pipe) character.
by Metasploit
EIP-2026-114802 EXPLOITDB ruby VERIFIED
QNX QCONN - Remote Command Execution (Metasploit)
by Metasploit
EIP-2026-111611 EXPLOITDB ruby VERIFIED
qdPM 7.0 - Arbitrary '.PHP' File Upload (Metasploit)
by Metasploit
CVE-2012-5159 EXPLOITDB ruby VERIFIED
phpMyAdmin <3.5.2.2 - RCE
phpMyAdmin 3.5.2.2, as distributed by the cdnetworks-kr-1 mirror during an unspecified time frame in 2012, contains an externally introduced modification (Trojan Horse) in server_sync.php, which allows remote attackers to execute arbitrary PHP code via an eval injection attack.
by Metasploit
CVE-2012-1182 EXPLOITDB ruby VERIFIED
Samba < 3.4.15 - Numeric Error
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
by Metasploit
CVE-2009-1185 EXPLOITDB ruby VERIFIED
Udev < 141 - Origin Validation Error
udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
by Metasploit
EIP-2026-102347 EXPLOITDB ruby VERIFIED
Oracle Business Transaction Management FlashTunnelService - Remote Code Execution (Metasploit)
by Metasploit
CVE-2010-0188 EXPLOITDB HIGH ruby VERIFIED
Adobe Acrobat < 8.2.1 - Denial of Service
Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
by Metasploit
CVSS 7.8
CVE-2010-0188 EXPLOITDB HIGH ruby VERIFIED
Adobe Acrobat < 8.2.1 - Denial of Service
Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
by Metasploit
CVSS 7.8
EIP-2026-109678 EXPLOITDB ruby
MyAuth3 - Blind SQL Injection
by Marcio Almeida
CVE-2012-3819 EXPLOITDB ruby VERIFIED
Dart Powertcp Activex - Memory Corruption
Stack consumption vulnerability in dartwebserver.dll 1.9 and earlier, as used in Dart PowerTCP WebServer for ActiveX and other products, allows remote attackers to cause a denial of service (daemon crash) via a long request.
by catatonicprime
CVE-2009-1831 EXPLOITDB ruby VERIFIED
Nullsoft Winamp < 5.55 - Numeric Error
The Nullsoft Modern Skins Support module (gen_ff.dll) in Nullsoft Winamp before 5.552 allows remote attackers to execute arbitrary code via a crafted MAKI file, which triggers an incorrect sign extension, an integer overflow, and a stack-based buffer overflow.
by Metasploit
CVE-2012-10041 EXPLOITDB CRITICAL ruby VERIFIED
WAN Emulator v2.3 - RCE
WAN Emulator v2.3 contains two unauthenticated command execution vulnerabilities. The result.php script calls shell_exec() with unsanitized input from the pc POST parameter, allowing remote attackers to execute arbitrary commands as the www-data user. The system also includes a SUID-root binary named dosu, which is vulnerable to command injection via its first argument. An attacker can exploit both flaws in sequence to achieve full remote code execution and escalate privileges to root.
by Metasploit
CVE-2012-10040 EXPLOITDB CRITICAL ruby VERIFIED
Openfiler v2.x - Command Injection
Openfiler v2.x contains a command injection vulnerability in the system.html page. The device parameter is used to instantiate a NetworkCard object, whose constructor in network.inc calls exec() with unsanitized input. An authenticated attacker can exploit this to execute arbitrary commands as the openfiler user. Due to misconfigured sudoers, the openfiler user can escalate privileges to root via sudo /bin/bash without a password.
by Metasploit
EIP-2026-116718 EXPLOITDB ruby VERIFIED
ActiveFax (ActFax) 4.3 - Client Importer Buffer Overflow (Metasploit)
by Metasploit
EIP-2026-104770 EXPLOITDB ruby VERIFIED
Sflog! CMS 1.0 - Arbitrary File Upload (Metasploit)
by Metasploit