Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2012-10048 EXPLOITDB HIGH ruby VERIFIED
Zenoss Core 3.x - Command Injection
Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.
by Metasploit
CVE-2012-2962 EXPLOITDB ruby VERIFIED
Plixer Scrutinizer <9.5.2 - SQL Injection
SQL injection vulnerability in d4d/statusFilter.php in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.2 allows remote authenticated users to execute arbitrary SQL commands via the q parameter.
by Metasploit
CVE-2012-0284 EXPLOITDB ruby VERIFIED
Cisco Linksys PlayerPT <1.0.0.15 - Buffer Overflow
Stack-based buffer overflow in the SetSource method in the Cisco Linksys PlayerPT ActiveX control 1.0.0.15 in PlayerPT.ocx on the Cisco WVC200 Wireless-G PTZ Internet video camera allows remote attackers to execute arbitrary code via a long URL in the first argument (aka the sURL argument).
by Metasploit
CVE-2012-10049 EXPLOITDB CRITICAL ruby VERIFIED
WebPageTest <2.6 - RCE
WebPageTest version 2.6 and earlier contains an arbitrary file upload vulnerability in the resultimage.php script. The application fails to validate or sanitize user-supplied input before saving uploaded files to a publicly accessible directory. This flaw allows remote attackers to upload and execute arbitrary PHP code, resulting in full remote code execution under the web server context.
by Metasploit
CVE-2012-1876 EXPLOITDB ruby VERIFIED
Microsoft Internet Explorer - Code Injection
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
by Metasploit
CVE-2010-3964 EXPLOITDB ruby VERIFIED
Microsoft Sharepoint Server - Unrestricted File Upload
Unrestricted file upload vulnerability in the Document Conversions Launcher Service in Microsoft Office SharePoint Server 2007 SP2, when the Document Conversions Load Balancer Service is enabled, allows remote attackers to execute arbitrary code via a crafted SOAP request to TCP port 8082, aka "Malformed Request Code Execution Vulnerability."
by Metasploit
CVE-2012-10051 EXPLOITDB HIGH ruby VERIFIED
Photodex ProShow Producer <5.0.3256 - Buffer Overflow
Photodex ProShow Producer version 5.0.3256 contains a stack-based buffer overflow vulnerability in the handling of plugin load list files. When a specially crafted load file is placed in the installation directory, the application fails to properly validate its contents, leading to a buffer overflow when the file is parsed during startup. Exploitation requires local access to place the file and user interaction to launch the application.
by Metasploit
CVE-2012-10050 EXPLOITDB CRITICAL ruby VERIFIED
CuteFlow <2.11.2 - RCE
CuteFlow version 2.11.2 and earlier contains an arbitrary file upload vulnerability in the restart_circulation_values_write.php script. The application fails to validate or restrict uploaded file types, allowing unauthenticated attackers to upload arbitrary PHP files to the upload/___1/ directory. These files are then accessible via the web server, enabling remote code execution.
by Metasploit
EIP-2026-118359 EXPLOITDB ruby VERIFIED
Cisco Linksys PlayerPT - ActiveX Control Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-2953 EXPLOITDB ruby VERIFIED
Symantec Web Gateway <5.0.3.18 - RCE
The management console in Symantec Web Gateway 5.0.x before 5.0.3.18 allows remote attackers to execute arbitrary commands via crafted input to application scripts.
by Metasploit
CVE-2012-10053 EXPLOITDB CRITICAL ruby VERIFIED
Simple Web Server 2.2 rc2 - Buffer Overflow
Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, leading to a buffer overflow on the stack. This flaw allows remote attackers to execute arbitrary code with the privileges of the web server process. The vulnerability is triggered before authentication.
by Metasploit
CVE-2012-10052 EXPLOITDB CRITICAL ruby VERIFIED
EGallery 1.2 - RCE
EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
by Metasploit
CVE-2011-3175 EXPLOITDB ruby VERIFIED
Novell Zenworks Configuration Management - Memory Corruption
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x6c request.
by Metasploit
CVE-2011-3176 EXPLOITDB ruby VERIFIED
Novell Zenworks Configuration Management - Memory Corruption
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.
by Metasploit
CVE-2011-3176 EXPLOITDB ruby VERIFIED
Novell Zenworks Configuration Management - Memory Corruption
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.
by Metasploit
EIP-2026-118975 EXPLOITDB ruby VERIFIED
Novell ZENworks Configuration Management Preboot Service 0x21 - Remote Buffer Overflow (Metasploit)
by Metasploit
EIP-2026-118974 EXPLOITDB ruby VERIFIED
Novell ZENworks Configuration Management Preboot Service 0x06 - Remote Buffer Overflow (Metasploit)
by Metasploit
CVE-2010-3888 EXPLOITDB ruby VERIFIED
Microsoft Windows - Privilege Escalation
Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local users to gain privileges via unknown vectors, as exploited in the wild in July 2010 by the Stuxnet worm, and identified by Kaspersky Lab researchers and other researchers.
by Metasploit
CVE-2009-2692 EXPLOITDB HIGH ruby VERIFIED
Linux kernel <2.6.30.4, <2.4.37.4 - Privilege Escalation
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
by Metasploit
CVSS 7.8
EIP-2026-118248 EXPLOITDB ruby VERIFIED
ALLMediaServer 0.8 - Remote Buffer Overflow (Metasploit)
by Metasploit
EIP-2026-101452 EXPLOITDB ruby
Siemens Simatic S7-300/400 - CPU START/STOP Module (Metasploit)
by Dillon Beresford
EIP-2026-101451 EXPLOITDB ruby
Siemens Simatic S7-300 - PLC Remote Memory Viewer (Metasploit)
by Dillon Beresford
EIP-2026-101450 EXPLOITDB ruby
Siemens Simatic S7-1200 - CPU START/STOP Module (Metasploit)
by Dillon Beresford
EIP-2026-113784 EXPLOITDB ruby VERIFIED
WordPress Plugin Generic - Arbitrary File Upload
by KedAns-Dz
CVE-2011-4542 EXPLOITDB ruby VERIFIED
Hastymail2 - SQL Injection
Hastymail2 2.1.1 before RC2 allows remote attackers to execute arbitrary commands via the (1) rs or (2) rsargs[] parameter in a mailbox Drafts action to the default URI.
by Metasploit