Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2011-2657 EXPLOITDB ruby VERIFIED
Novell Zenworks Configuration Management - Path Traversal
Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument.
by Metasploit
CVE-2012-1723 EXPLOITDB CRITICAL ruby VERIFIED
Java Applet Field Bytecode Verifier Cache Remote Code Execution
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
by Metasploit
CVSS 9.8
CVE-2012-10054 EXPLOITDB CRITICAL ruby VERIFIED
Umbraco CMS <4.7.1 - RCE
Umbraco CMS versions prior to 4.7.1 are vulnerable to unauthenticated remote code execution via the codeEditorSave.asmx SOAP endpoint, which exposes a SaveDLRScript operation that permits arbitrary file uploads without authentication. By exploiting a path traversal flaw in the fileName parameter, attackers can write malicious ASPX scripts directly into the web-accessible /umbraco/ directory and execute them remotely.
by Metasploit
CVSS 9.8
CVE-2012-0911 EXPLOITDB CRITICAL ruby VERIFIED
TikiWiki CMS/Groupware < 6.7 LTS & < 8.4 - RCE
TikiWiki CMS/Groupware before 6.7 LTS and before 8.4 allows remote attackers to execute arbitrary PHP code via a crafted serialized object in the (1) cookieName to lib/banners/bannerlib.php; (2) printpages or (3) printstructures parameter to (a) tiki-print_multi_pages.php or (b) tiki-print_pages.php; or (4) sendpages, (5) sendstructures, or (6) sendarticles parameter to tiki-send_objects.php, which is not properly handled when processed by the unserialize function.
by Metasploit
CVSS 9.8
CVE-2012-3996 EXPLOITDB ruby VERIFIED
Tikiwiki Cms/groupware < 8.2 - Information Disclosure
TikiWiki CMS/Groupware 8.3 and earlier allows remote attackers to obtain the installation path via a direct request to (1) admin/include_calendar.php, (2) tiki-rss_error.php, or (3) tiki-watershed_service.php.
by Metasploit
CVE-2012-3399 EXPLOITDB ruby VERIFIED
Artis.imag Basilic - Improper Input Validation
Config/diff.php in Basilic 1.5.14 allows remote attackers to execute arbitrary commands via shell metacharacters in the file parameter.
by Metasploit
EIP-2026-119043 EXPLOITDB ruby VERIFIED
Poison Ivy 2.3.2 (C2 Server) - Remote Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-0708 EXPLOITDB ruby VERIFIED
IBM Rational ClearQuest <7.1.1.9, <7.1.2.6, <8.0.0.2 - Buffer Overflow
Heap-based buffer overflow in the Ole API in the CQOle ActiveX control in cqole.dll in IBM Rational ClearQuest 7.1.1 before 7.1.1.9, 7.1.2 before 7.1.2.6, and 8.0.0 before 8.0.0.2 allows remote attackers to execute arbitrary code via a crafted web page that leverages a RegisterSchemaRepoFromFileByDbSet function-prototype mismatch.
by Metasploit
CVE-2012-4031 EXPLOITDB ruby
Wangkongbao Cns-1000 - Path Traversal
Multiple directory traversal vulnerabilities in src/acloglogin.php in Wangkongbao CNS-1000 and 1100 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) lang or (2) langid cookie to port 85.
by Dillon Beresford
CVE-2012-0124 EXPLOITDB ruby VERIFIED
HP Data Protector Express - Denial of Service
Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors.
by Metasploit
CVE-2012-0897 EXPLOITDB ruby VERIFIED
IrfanView PlugIns <4.33 - RCE
Stack-based buffer overflow in the JPEG2000 plugin in IrfanView PlugIns before 4.33 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment.
by Metasploit
CVE-2012-0663 EXPLOITDB ruby VERIFIED
Apple QuickTime <7.7.2 - Buffer Overflow
Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TeXML file.
by Metasploit
CVE-2008-6508 EXPLOITDB ruby VERIFIED
Igniterealtime Openfire < 3.6.0a - Path Traversal
Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI.
by Metasploit
CVE-2012-0694 EXPLOITDB CRITICAL ruby VERIFIED
SugarCRM CE <= 6.3.1 - Code Injection
SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code.
by Metasploit
CVSS 9.8
CVE-2012-0677 EXPLOITDB ruby VERIFIED
Apple iTunes <10.6.3 - Buffer Overflow
Heap-based buffer overflow in Apple iTunes before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted .m3u playlist.
by Metasploit
CVE-2012-0779 EXPLOITDB ruby VERIFIED
Adobe Flash Player <10.3.183.19-11.2.202.235 - RCE
Adobe Flash Player before 10.3.183.19 and 11.x before 11.2.202.235 on Windows, Mac OS X, and Linux; before 11.1.111.9 on Android 2.x and 3.x; and before 11.1.115.8 on Android 4.x allows remote attackers to execute arbitrary code via a crafted file, related to an "object confusion vulnerability," as exploited in the wild in May 2012.
by Metasploit
EIP-2026-118273 EXPLOITDB ruby VERIFIED
Apple iTunes 10.6.1.7 - Extended m3u Stack Buffer Overflow (Metasploit)
by Rh0
CVE-2011-2110 EXPLOITDB ruby VERIFIED
Adobe Flash Player <10.3.181.26-10.3.185.23 - RCE
Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in June 2011.
by Metasploit
EIP-2026-118530 EXPLOITDB ruby VERIFIED
EZHomeTech EzServer 6.4.017 - Remote Stack Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-2329 EXPLOITDB ruby VERIFIED
PHP <5.4.3 - Buffer Overflow
Buffer overflow in the apache_request_headers function in sapi/cgi/cgi_main.c in PHP 5.4.x before 5.4.3 allows remote attackers to cause a denial of service (application crash) via a long string in the header of an HTTP request.
by Metasploit
CVE-2012-2915 EXPLOITDB ruby VERIFIED
Lattice Semiconductor PAC-Designer <6.2.1344 - Buffer Overflow
Stack-based buffer overflow in Lattice Semiconductor PAC-Designer 6.2.1344 allows remote attackers to execute arbitrary code via a long string in a Value tag in a SymbolicSchematicData definition tag in PAC Design (.pac) file.
by Metasploit
CVE-2012-1889 EXPLOITDB HIGH ruby VERIFIED
Microsoft Xml Core Services - Out-of-Bounds Write
Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
by Metasploit
CVSS 8.8
CVE-2012-10055 EXPLOITDB CRITICAL ruby VERIFIED
ComSndFTP FTP Server <1.3.7 Beta - Code Injection
ComSndFTP FTP Server version 1.3.7 Beta contains a format string vulnerability in its handling of the USER command. By sending a specially crafted username containing format specifiers, a remote attacker can overwrite a hardcoded function pointer in memory (specifically WSACleanup from Ws2_32.dll). This allows the attacker to redirect execution flow and bypass DEP protections using a ROP chain, ultimately leading to arbitrary code execution. The vulnerability is exploitable without authentication and affects default configurations.
by Metasploit
EIP-2026-118002 EXPLOITDB ruby VERIFIED
TFM MMPlayer - '.m3u' / '.ppl' Local Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-1875 EXPLOITDB ruby VERIFIED
Microsoft Internet Explorer - Code Injection
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Same ID Property Remote Code Execution Vulnerability."
by Metasploit