Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2012-10058 EXPLOITDB CRITICAL ruby VERIFIED
RabidHamster R4 v1.25 - Buffer Overflow
RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
by Metasploit
CVE-2008-0320 EXPLOITDB ruby VERIFIED
OpenOffice OLE Importer DocumentSummaryInformation Stream Handling Overflow
Heap-based buffer overflow in the OLE importer in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.
by Metasploit
CVE-2012-1153 EXPLOITDB ruby VERIFIED
Apprain < 0.1.5 - Unrestricted File Upload
Unrestricted file upload vulnerability in addons/uploadify/uploadify.php in appRain CMF 0.1.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the uploads directory.
by Metasploit
EIP-2026-102155 EXPLOITDB ruby VERIFIED
Apple iOS 5.1.1 Safari Browser - 'JS match()' / 'search()' Crash (PoC)
by Alberto Ortega
EIP-2026-118550 EXPLOITDB ruby VERIFIED
FlexNet License Server Manager - lmgrd Buffer Overflow (Metasploit)
by Metasploit
CVE-2012-4361 EXPLOITDB ruby VERIFIED
HP San/iq < 9.0 - OS Command Injection
lhn/public/network/ping in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the second parameter.
by Metasploit
CVE-2009-0837 EXPLOITDB ruby VERIFIED
Foxit Reader <3.0 Build 1506 - Buffer Overflow
Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action.
by Metasploit
CVE-2012-2940 EXPLOITDB ruby VERIFIED
MediaChance Real-DRAW PRO 5.2.4 - DoS
MediaChance Real-DRAW PRO 5.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted (1) PNG, (2) WMF, (3) PSD, (4) TGA, (5) TTF, (6) BMP, (7) TIFF, or (8) PCX file.
by Ahmed Elhady Mohamed
EIP-2026-115174 EXPLOITDB ruby VERIFIED
DVD-Lab Studio 1.25 - '.DAL' File Open Crash
by Ahmed Elhady Mohamed
CVE-2012-4362 EXPLOITDB ruby VERIFIED
HP San/iq - Credentials Management
hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838.
by Metasploit
CVE-2008-3257 EXPLOITDB ruby VERIFIED
Oracle WebLogic Server <10.3 - Buffer Overflow
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
by Metasploit
CVE-2012-6554 EXPLOITDB ruby VERIFIED
A51dev Activecollab Chat Module - Improper Input Validation
functions/html_to_text.php in the Chat module before 1.5.2 for activeCollab allows remote authenticated users to execute arbitrary PHP code via the message[message_text] parameter to chat/add_messag, which is not properly handled when executing the preg_replace function with the eval switch.
by Metasploit
EIP-2026-104087 EXPLOITDB ruby VERIFIED
Squiggle 1.7 - SVG Browser Java Code Execution (Metasploit)
by Metasploit
EIP-2026-115880 EXPLOITDB ruby VERIFIED
MultiMedia Builder 4.9.8 - '.mef' Denial of Service
by Ahmed Elhady Mohamed
CVE-2011-3659 EXPLOITDB ruby VERIFIED
Mozilla Firefox <4.10 - Use After Free
Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.
by Metasploit
EIP-2026-118430 EXPLOITDB ruby VERIFIED
Distinct TFTP 3.01 - Writable Directory Traversal Execution (Metasploit)
by Metasploit
CVE-2011-4449 EXPLOITDB ruby VERIFIED
WikkaWiki 1.3.1-1.3.2 - RCE
actions/files/files.php in WikkaWiki 1.3.1 and 1.3.2, when INTRANET_MODE is enabled, supports file uploads for file extensions that are typically absent from an Apache HTTP Server TypesConfig file, which makes it easier for remote attackers to execute arbitrary PHP code by placing this code in a file whose name has multiple extensions, as demonstrated by a (1) .mm or (2) .vpp file.
by Metasploit
CVE-2011-3658 EXPLOITDB ruby VERIFIED
Mozilla Firefox <8.0, Thunderbird <8.0, SeaMonkey <2.5 - DoS
The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.
by Metasploit
CVE-2012-2576 EXPLOITDB CRITICAL ruby VERIFIED
SolarWinds <5.1.2 - SQL Injection
SQL injection vulnerability in the LoginServlet page in SolarWinds Storage Manager before 5.1.2, SolarWinds Storage Profiler before 5.1.2, and SolarWinds Backup Profiler before 5.1.2 allows remote attackers to execute arbitrary SQL commands via the loginName field.
by Metasploit
CVSS 9.8
CVE-2012-2336 EXPLOITDB ruby VERIFIED
PHP <5.3.13 & <5.4.3 - DoS
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
by Metasploit
CVE-2012-1775 EXPLOITDB ruby VERIFIED
Videolan Vlc Media Player < 2.0.0 - Memory Corruption
Stack-based buffer overflow in VideoLAN VLC media player before 2.0.1 allows remote attackers to execute arbitrary code via a crafted MMS:// stream.
by Metasploit
CVE-2012-4598 EXPLOITDB ruby VERIFIED
McAfee Virtual Technician <6.4 - RCE
An unspecified ActiveX control in McAfee Virtual Technician (MVT) before 6.4, and ePO-MVT, allows remote attackers to execute arbitrary code or cause a denial of service (Internet Explorer crash) via a crafted web site.
by Metasploit
CVE-2012-1495 EXPLOITDB CRITICAL ruby VERIFIED
Webcalendar < 1.2.5 - Injection
install/index.php in WebCalendar before 1.2.5 allows remote attackers to execute arbitrary code via the form_single_user_login parameter.
by Metasploit
CVSS 9.8
CVE-2012-4054 EXPLOITDB ruby VERIFIED
Cpe17 Autorun Killer < 1.7.1 - Memory Corruption
Buffer overflow in the readfile function in CPE17 Autorun Killer 1.7.1 and earlier allows physically proximate attackers to execute arbitrary code via a crafted inf file.
by Xenithz xpt
CVE-2012-0158 EXPLOITDB HIGH ruby VERIFIED
Microsoft Office - Code Injection
The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."
by Metasploit
CVSS 8.8