Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2009-1642 EXPLOITDB ruby VERIFIED
Mini-stream TO Mp3 Converter - Memory Corruption
Multiple stack-based buffer overflows in Mini-stream ASX to MP3 Converter 3.0.0.7 allow remote attackers to execute arbitrary code via (1) a long rtsp URL in a .ram file and (2) a long string in the HREF attribute of a REF element in a .asx file. NOTE: the latter was also subsequently reported in "prior to 3.1.3.7."
by Metasploit
CVE-2008-1611 EXPLOITDB ruby VERIFIED
TFTP Server SP 1.4 - Buffer Overflow
Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote attackers to cause a denial of service or execute arbitrary code via a long filename in a read or write request.
by Metasploit
EIP-2026-118190 EXPLOITDB ruby VERIFIED
xRadio 0.95b - Local Buffer Overflow (Metasploit)
by Metasploit
CVE-2008-5499 EXPLOITDB ruby VERIFIED
Adobe Flash Player ActionScript Launch Command Execution Vulnerability
Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
by Metasploit
EIP-2026-117255 EXPLOITDB ruby VERIFIED
GSM SIM Editor 5.15 - Local Buffer Overflow (Metasploit)
by Metasploit
CVE-2011-5171 EXPLOITDB ruby VERIFIED
Cyberlink Power2go - Memory Corruption
Multiple stack-based buffer overflows in CyberLink Power2Go 7 (build 196) and 8 (build 1031) allow remote attackers to execute arbitrary code via the (1) src and (2) name parameters in a p2g project file.
by Metasploit
CVE-2011-4828 EXPLOITDB ruby VERIFIED
Autosectools V-cms - Code Injection
Unrestricted file upload vulnerability in includes/inline_image_upload.php in AutoSec Tools V-CMS 1.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in temp/.
by Metasploit
CVE-2012-5896 EXPLOITDB ruby VERIFIED
Quest InTrust <10.4.0.853 - RCE
The Annotation Objects Extension ActiveX control in AnnotateX.dll in Quest InTrust 10.4.0.853 and earlier does not properly implement the Add method, which allows remote attackers to execute arbitrary code via a memory address in the first argument, related to an "uninitialized pointer."
by Metasploit
CVE-2012-0198 EXPLOITDB ruby VERIFIED
IBM Tivoli Provisioning Manager Expre... - Buffer Overflow
Stack-based buffer overflow in the RunAndUploadFile method in the Isig.isigCtl.1 ActiveX control in IBM Tivoli Provisioning Manager Express for Software Distribution 4.1.1 allows remote attackers to execute arbitrary code via vectors related to an Asset Information file.
by Metasploit
CVE-2012-10059 EXPLOITDB CRITICAL ruby VERIFIED
Dolibarr ERP/CRM <= 3.1.1-3.2.0 - Command Injection
Dolibarr ERP/CRM versions <= 3.1.1 and <= 3.2.0 contain a post-authenticated OS command injection vulnerability in its database backup feature. The export.php script fails to sanitize the sql_compat parameter, allowing authenticated users to inject arbitrary system commands, resulting in remote code execution on the server.
by Metasploit
CVE-2006-5276 EXPLOITDB ruby VERIFIED
Snort < 2.6.1.2 - Buffer Overflow
Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic.
by Metasploit
CVE-2012-6664 EXPLOITDB CRITICAL ruby VERIFIED
Distinct Intranet Servers <3.10 - Path Traversal
Multiple directory traversal vulnerabilities in the TFTP Server in Distinct Intranet Servers 3.10 and earlier allow remote attackers to read or write arbitrary files via a .. (dot dot) in the (1) get or (2) put commands.
by Metasploit
CVSS 9.1
CVE-2012-1196 EXPLOITDB ruby VERIFIED
Landesk Lenovo Thinkmanagement Console - Path Traversal
Directory traversal vulnerability in the VulCore web service (WSVulnerabilityCore/VulCore.asmx) in Lenovo ThinkManagement Console 9.0.3 allows remote attackers to delete arbitrary files via a .. (dot dot) in the filename parameter in a SetTaskLogByFile SOAP request.
by Metasploit
CVE-2011-1571 EXPLOITDB ruby
Liferay Portal CE <6.0.6 - RCE
Unspecified vulnerability in the XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote attackers to execute arbitrary commands via unknown vectors.
by Spencer McIntyre
CVE-2012-4876 EXPLOITDB ruby VERIFIED
TRENDnet SecurView TV-IP121WN - Buffer Overflow
Stack-based buffer overflow in the UltraMJCam ActiveX Control in TRENDnet SecurView TV-IP121WN Wireless Internet Camera allows remote attackers to execute arbitrary code via a long string to the OpenFileDlg method.
by Metasploit
CVE-2012-0270 EXPLOITDB ruby VERIFIED
Csound <5.16.6 - Buffer Overflow
Multiple stack-based buffer overflows in Csound before 5.16.6 allow remote attackers to execute arbitrary code via a crafted (1) hetro file to the getnum function in util/heti_main.c or (2) PVOC file to the getnum function in util/pv_import.c.
by Metasploit
CVE-2011-10012 EXPLOITDB HIGH ruby VERIFIED
NetOp v9.5 - Buffer Overflow
NetOp (now part of Impero Software) Remote Control Client v9.5 is vulnerable to a stack-based buffer overflow when processing .dws configuration files. If a .dws file contains a string longer than 520 bytes, the application fails to perform proper bounds checking, allowing an attacker to execute arbitrary code when the file is opened.
by Metasploit
EIP-2026-115290 EXPLOITDB ruby VERIFIED
FoxPlayer 2.6.0 - Denial of Service
by Ahmed Elhady Mohamed
CVE-2012-5917 EXPLOITDB ruby
TOM Wilkason Snackamp - Memory Corruption
SnackAmp 3.1.3 allows remote attackers to cause a denial of service (application crash) via a long string in an aiff file.
by Ahmed Elhady Mohamed
CVE-2012-0507 EXPLOITDB CRITICAL ruby VERIFIED
Java AtomicReferenceArray Type Violation Vulnerability
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
by Metasploit
CVSS 9.8
CVE-2008-0610 EXPLOITDB ruby VERIFIED
Ultravnc - Memory Corruption
Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.
by Metasploit
CVE-2012-5002 EXPLOITDB ruby VERIFIED
Ricoh DC Software DL-10 <4.5.0.1 - Buffer Overflow
Stack-based buffer overflow in SR10 FTP server (SR10.exe) 1.1.0.6 in Ricoh DC Software DL-10 4.5.0.1, when the Log file name option is enabled, allows remote attackers to execute arbitrary code via a long USER FTP command.
by Metasploit
CVE-2012-4869 EXPLOITDB ruby VERIFIED
FreePBX <2.10 - Command Injection
The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.
by Metasploit
CVE-2010-0248 EXPLOITDB HIGH ruby VERIFIED
Microsoft Internet Explorer - Code Injection
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
by Metasploit
CVSS 8.1
EIP-2026-118405 EXPLOITDB ruby VERIFIED
Dell Webcam CrazyTalk - ActiveX BackImage (Metasploit)
by Metasploit