Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2011-3167 EXPLOITDB ruby VERIFIED
HP OpenView Network Node Manager <7.51-7.53 - RCE
Unspecified vulnerability in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1210.
by Metasploit
EIP-2026-103115 EXPLOITDB ruby VERIFIED
Gitorious - Arbitrary Command Execution (Metasploit)
by Metasploit
CVE-2011-4786 EXPLOITDB ruby VERIFIED
HP Easy Printer Care Software < 2.5 - Code Injection
A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-2404 and CVE-2011-4787.
by Metasploit
CVE-2010-10016 EXPLOITDB CRITICAL ruby VERIFIED
BS.Player 2.57 - Buffer Overflow
BS.Player version 2.57 (build 1051) contains a vulnerability in its playlist import functionality. When processing .m3u files, the application fails to properly validate the length of playlist entries, resulting in a buffer overflow condition. This flaw occurs during parsing of long URLs embedded in the playlist, allowing overwrite of Structured Exception Handler (SEH) records. The vulnerability is triggered upon opening a crafted playlist file and affects the Unicode parsing logic in the Windows client.
by Metasploit
EIP-2026-118764 EXPLOITDB ruby VERIFIED
McAfee SaaS MyCioScan ShowReport - Remote Command Execution (Metasploit)
by Metasploit
CVE-2011-0065 EXPLOITDB ruby VERIFIED
Mozilla Firefox <3.5.19 & SeaMonkey <2.0.14 - Use After Free
Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
by Metasploit
CVE-2012-10062 EXPLOITDB HIGH ruby VERIFIED
XAMPP 1.7.3 - RCE
A vulnerability in XAMPP, developed by Apache Friends, version 1.7.3's default WebDAV configuration allows remote authenticated attackers to upload and execute arbitrary PHP code. The WebDAV service, accessible via /webdav/, accepts HTTP PUT requests using default credentials. This permits attackers to upload a malicious PHP payload and trigger its execution via a subsequent GET request, resulting in remote code execution on the server.
by Metasploit
CVE-2005-1790 EXPLOITDB ruby VERIFIED
Microsoft Internet Explorer - Resource Management Error
Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
by Metasploit
CVE-2011-2462 EXPLOITDB CRITICAL ruby VERIFIED
Adobe Acrobat < 10.1.1 - Out-of-Bounds Write
Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
by Metasploit
CVSS 9.8
CVE-2011-4107 EXPLOITDB MEDIUM ruby
phpMyAdmin <3.4.7.1 & <3.3.10.5 - XXE Injection
The simplexml_load_string function in the XML import plug-in (libraries/import/xml.php) in phpMyAdmin 3.4.x before 3.4.7.1 and 3.3.x before 3.3.10.5 allows remote authenticated users to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.
by Marco Batista
CVSS 6.5
CVE-2011-4862 EXPLOITDB ruby VERIFIED
GNU Inetutils < 1.9 - Buffer Overflow
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
by Metasploit
CVE-2011-4862 EXPLOITDB ruby VERIFIED
GNU Inetutils < 1.9 - Buffer Overflow
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
by Metasploit
CVE-2011-5052 EXPLOITDB ruby VERIFIED
Cocsoft Stream Down - Memory Corruption
Stack-based buffer overflow in CoCSoft Stream Down 6.8.0 allows remote web servers to execute arbitrary code via a long response to a download request.
by Fady Mohammed Osman
CVE-2011-4453 EXPLOITDB ruby VERIFIED
Pmwiki - Code Injection
The PageListSort function in scripts/pagelist.php in PmWiki 2.x before 2.2.35 allows remote attackers to execute arbitrary code via PHP sequences in a crafted order parameter in a pagelist directive, leading to unintended use of the PHP create_function function.
by Metasploit
CVE-2011-10013 EXPLOITDB CRITICAL ruby VERIFIED
Traq <2.3 - RCE
Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.
by Metasploit
CVE-2011-5007 EXPLOITDB ruby VERIFIED
3ssoftware Codesys < 3.4 - Memory Corruption
Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 and earlier, as used on the ABB AC500 PLC and possibly other products, allows remote attackers to execute arbitrary code via a long URI to TCP port 8080.
by Metasploit
CVE-2011-5130 EXPLOITDB ruby VERIFIED
Haudenschilt Family Connections Cms - Code Injection
dev/less.php in Family Connections CMS (FCMS) 2.5.0 - 2.7.1, when register_globals is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in the argv[1] parameter.
by Metasploit
CVE-2011-5170 EXPLOITDB ruby VERIFIED
Castillobueno Ccmplayer - Memory Corruption
Stack-based buffer overflow in Castillo Bueno Systems CCMPlayer 1.5 allows remote attackers to execute arbitrary code via a long track name in an m3u playlist.
by Metasploit
CVE-2004-2111 EXPLOITDB ruby VERIFIED
Serv-U FTP Server <4.2 - Buffer Overflow
Stack-based buffer overflow in the site chmod command in Serv-U FTP Server before 4.2 allows remote attackers to execute arbitrary code via a long filename.
by Metasploit
CVE-2011-5003 EXPLOITDB ruby VERIFIED
Avid Media Composer < 5.5.3 - Memory Corruption
Stack-based buffer overflow in the Phonetic Indexer (AvidPhoneticIndexer.exe) in Avid Media Composer 5.5.3 and earlier allows remote attackers to execute arbitrary code via a long request to TCP port 4659.
by Nick Freeman
CVE-2011-5172 EXPLOITDB ruby
Powerproduction Storyboard Quick - Memory Corruption
Stack-based buffer overflow in StoryBoard Quick 6 Build 3786, and possibly StoryBoard Artist and StoryBoard Studio, allows remote attackers to execute arbitrary code via a long string in the string element field in a frame xml file.
by Nick Freeman
CVE-2011-5002 EXPLOITDB ruby
Finaldraft < 8.01 - Memory Corruption
Multiple stack-based buffer overflows in Final Draft 8 before 8.02 allow remote attackers to execute arbitrary code via a .fdx or .fdxt file with long (1) Word, (2) Transition, (3) Location, (4) Extension, (5) SceneIntro, (6) TimeOfDay, and (7) Character elements.
by Nick Freeman
CVE-2011-5170 EXPLOITDB ruby VERIFIED
Castillobueno Ccmplayer - Memory Corruption
Stack-based buffer overflow in Castillo Bueno Systems CCMPlayer 1.5 allows remote attackers to execute arbitrary code via a long track name in an m3u playlist.
by Rh0
CVE-2011-3544 EXPLOITDB CRITICAL ruby VERIFIED
Java Applet Rhino Script Engine Remote Code Execution
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
by Metasploit
CVSS 9.8
CVE-2011-5010 EXPLOITDB ruby VERIFIED
Ctekproducts Skyrouter - Access Control
apps/a3/cfg_ethping.cgi in the Ctek SkyRouter 4200 and 4300 allows remote attackers to execute arbitrary commands via shell metacharacters in the PINGADDRESS parameter for a "u" action.
by Metasploit