Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2011-2763 EXPLOITDB ruby VERIFIED
Lifesize Room Appliance Software - Improper Input Validation
The web interface on the LifeSize Room appliance LS_RM1_3.5.3 (11) and 4.7.18 allows remote attackers to execute arbitrary commands via a modified request to the LSRoom_Remoting.doCommand function in gateway.php.
by Spencer McIntyre
EIP-2026-119174 EXPLOITDB ruby
Sunway Force Control SCADA 6.1 SP3 - 'httpsrv.exe' Remote Overflow
by Canberk BOLAT
CVE-2006-2369 EXPLOITDB ruby VERIFIED
Realvnc - Authentication Bypass
RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
by Metasploit
EIP-2026-108074 EXPLOITDB ruby
Jcow Social Networking Script 4.2 < 5.2 - Arbitrary Code Execution (Metasploit)
by Aung Khant
CVE-2011-2404 EXPLOITDB ruby VERIFIED
HP Easy Printer Care Software < 2.5 - Code Injection
A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-4786 and CVE-2011-4787.
by Metasploit
CVE-2009-2335 EXPLOITDB ruby
WordPress <2.8.1 - Info Disclosure
WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
by Tiago Ferreira & Heyder Andrade
CVE-2009-1429 EXPLOITDB ruby VERIFIED
Symantec Antivirus < 9.0 - Code Injection
The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary commands via a crafted packet whose contents are interpreted as a command to be launched in a new process by the CreateProcessA function.
by Metasploit
EIP-2026-119184 EXPLOITDB ruby VERIFIED
Symantec System Center Alert Management System - 'hndlrsvc.exe' Arbitrary Command Execution (Metasploit)
by Metasploit
EIP-2026-119158 EXPLOITDB ruby
Solar FTP Server 2.1.2 - PASV Buffer Overflow (Metasploit)
by Qnix
CVE-2010-0904 EXPLOITDB ruby VERIFIED
Oracle Secure Backup 10.3.0.1 - Info Disclosure
Unspecified vulnerability in Oracle Secure Backup 10.3.0.1 allows remote attackers to affect integrity via unknown vectors.
by Metasploit
CVE-2010-1870 EXPLOITDB ruby VERIFIED
Struts 2.0.0-2.1.8.1 - RCE
The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.
by Metasploit
CVE-2010-0480 EXPLOITDB ruby VERIFIED
Microsoft Windows 2000 - Memory Corruption
Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability."
by Metasploit
EIP-2026-119209 EXPLOITDB ruby VERIFIED
TeeChart Professional ActiveX Control 2010.0.0.3 - Trusted Integer Dereference (Metasploit)
by Metasploit
CVE-2011-0065 EXPLOITDB ruby VERIFIED
Mozilla Firefox <3.5.19 & SeaMonkey <2.0.14 - Use After Free
Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
by Metasploit
EIP-2026-116691 EXPLOITDB ruby VERIFIED
A-PDF All to MP3 2.3.0 - Universal DEP Bypass
by C4SS!0 G0M3S
CVE-2010-4107 EXPLOITDB ruby
HP 9000 - Path Traversal
The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack.
by Myo Soe
CVE-2010-4107 EXPLOITDB ruby
HP 9000 - Path Traversal
The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack.
by Myo Soe
CVE-2011-0065 EXPLOITDB ruby VERIFIED
Mozilla Firefox <3.5.19 & SeaMonkey <2.0.14 - Use After Free
Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
by Rh0
CVE-2011-0807 EXPLOITDB ruby VERIFIED
Oracle Sun GlassFish Enterprise Server <3.0.1 - Info Disclosure
Unspecified vulnerability in Oracle Sun GlassFish Enterprise Server 2.1, 2.1.1, and 3.0.1, and Sun Java System Application Server 9.1, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Administration.
by Metasploit
EIP-2026-117198 EXPLOITDB ruby VERIFIED
FreeAmp 2.0.7 - '.fat' Local Buffer Overflow (Metasploit)
by James Fitts
EIP-2026-116706 EXPLOITDB ruby VERIFIED
ABBS Electronic Flashcards 2.1 - Local Buffer Overflow (Metasploit)
by James Fitts
EIP-2026-116703 EXPLOITDB ruby VERIFIED
ABBS Audio Media Player 3.0 - Local Buffer Overflow (Metasploit)
by James Fitts
CVE-2002-2268 EXPLOITDB ruby VERIFIED
Netdave Webster HTTP Server - Memory Corruption
Buffer overflow in Webster HTTP Server allows remote attackers to execute arbitrary code via a long URL.
by Metasploit
CVE-2004-0964 EXPLOITDB ruby VERIFIED
Zinf <2.2.1 - RCE
Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file.
by C4SS!0 & h1ch4m
EIP-2026-102466 EXPLOITDB ruby VERIFIED
CA Arcserve D2D GWT RPC - Credential Information Disclosure (Metasploit)
by Metasploit