Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
CVE-2006-5650 EXPLOITDB ruby VERIFIED
America Online ICQ 5.1 - RCE
The ICQPhone.SipxPhoneManager ActiveX control in America Online ICQ 5.1 allows remote attackers to download and execute arbitrary code via the DownloadAgent function, as demonstrated using an ICQ avatar.
by Metasploit
CVE-2004-0964 EXPLOITDB ruby VERIFIED
Zinf <2.2.1 - RCE
Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file.
by Metasploit
CVE-2008-2905 EXPLOITDB ruby VERIFIED
Mambo - Code Injection
PHP remote file inclusion vulnerability in includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo 4.6.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
by Metasploit
CVE-2006-2685 EXPLOITDB ruby VERIFIED
Kevin Johnson Basic Analysis And Security Engine - Code Injection
PHP remote file inclusion vulnerability in Basic Analysis and Security Engine (BASE) 1.2.4 and earlier, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the BASE_path parameter to (1) base_qry_common.php, (2) base_stat_common.php, and (3) includes/base_include.inc.php.
by Metasploit
CVE-2010-0304 EXPLOITDB ruby VERIFIED
Wireshark - Memory Corruption
Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.
by Metasploit
CVE-2009-3068 EXPLOITDB ruby VERIFIED
Adobe Robohelp Server - Access Control
Unrestricted file upload vulnerability in the RoboHelpServer Servlet (robohelp/server) in Adobe RoboHelp Server 8 allows remote attackers to execute arbitrary code by uploading a Java Archive (.jsp) file during a PUBLISH action, then accessing it via a direct request to the file in the robohelp/robo/reserved/web directory under its sessionid subdirectory, as demonstrated by the vd_adobe module in VulnDisco Pack Professional 8.7 through 8.11.
by Metasploit
CVE-2009-2265 EXPLOITDB ruby VERIFIED
FCKeditor <2.6.4.1 - Path Traversal
Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.
by Metasploit
CVE-2008-5405 EXPLOITDB ruby VERIFIED
Cain & Abel <4.9.24 - Buffer Overflow
Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel 4.9.23 and 4.9.24, and possibly earlier, allows remote attackers to execute arbitrary code via an RDP file containing a long string.
by Metasploit
CVE-2003-0213 EXPLOITDB ruby VERIFIED
Poptop Pptp Server - Buffer Overflow
ctrlpacket.c in PoPToP PPTP server before 1.1.4-b3 allows remote attackers to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.
by Metasploit
CVE-2010-5323 EXPLOITDB ruby VERIFIED
Novell ZENworks <10.3 - Path Traversal
Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a crafted WAR pathname in the filename parameter in conjunction with WAR content in the POST data, a different vulnerability than CVE-2010-5324.
by Metasploit
CVE-2010-5324 EXPLOITDB ruby VERIFIED
Novell ZENworks Configuration Management (ZCM) <10.3 - Path Traversal
Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a zenworks-fileupload request with a crafted directory name in the type parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323.
by Metasploit
CVE-2009-2364 EXPLOITDB ruby VERIFIED
Mp3-Nator 2.0 - Buffer Overflow
Stack-based buffer overflow in Mp3-Nator 2.0 allows remote attackers to execute arbitrary code via (1) a long string in a .plf file and (2) a long string in the listdata.dat file, possibly related to a track entry.
by Muhamad Fadzil Ramli
EIP-2026-117065 EXPLOITDB ruby VERIFIED
DIZzy 1.12 - Local Stack Overflow
by g30rg3_x
CVE-2010-20112 EXPLOITDB CRITICAL ruby VERIFIED
Amlib's NetOpacs webquery.dll - Buffer Overflow
Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments
by Metasploit
CVE-2010-20108 EXPLOITDB HIGH ruby VERIFIED
FTPPad <= 1.2.0 - Buffer Overflow
FTPPad <= 1.2.0 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long directory and filename, the application fails to properly validate input length. This results in a buffer overflow that overwrites the saved Extended Instruction Pointer (EIP), allowing remote attackers to execute arbitrary code.
by Metasploit
CVE-2010-20107 EXPLOITDB HIGH ruby VERIFIED
FTP Synchronizer Professional <= v4.0.73.274 - Buffer Overflow
A stack-based buffer overflow exists in FTP Synchronizer Professional <= v4.0.73.274. When the client connects to an FTP server and issues a LIST command—typically during sync preview or profile creation—the server’s response containing an overly long filename triggers a buffer overflow. This results in the corruption of the Structured Exception Handler (SEH), potentially allowing remote code execution.
by Metasploit
CVE-2010-20049 EXPLOITDB CRITICAL ruby VERIFIED
LeapFTP <3.1.x - Buffer Overflow
LeapFTP < 3.1.x contains a stack-based buffer overflow vulnerability in its FTP client parser. When the client receives a directory listing containing a filename longer than 528 bytes, the application fails to properly bound-check the input and overwrites the Structured Exception Handler (SEH) chain. This allows an attacker operating a malicious FTP server to execute arbitrary code on the victim’s machine when the file is listed or downloaded.
by Metasploit
CVE-2010-20045 EXPLOITDB HIGH ruby VERIFIED
FileWrangler <= 5.30 - Buffer Overflow
FileWrangler <= 5.30 suffers from a stack-based buffer overflow vulnerability when parsing directory listings from an FTP server. A malicious server can send an overlong folder name in response to a LIST command, triggering memory corruption during client-side rendering. Exploitation requires passive user interaction—simply connecting to the server—without further input. Successful exploitation may lead to arbitrary code execution.
by Metasploit
CVE-2010-20034 EXPLOITDB HIGH ruby VERIFIED
Gekko Manager FTP Client <= 0.77 - Buffer Overflow
Gekko Manager FTP Client <= 0.77 contains a stack-based buffer overflow in its FTP directory listing parser. When processing a server response to a LIST command, the client fails to properly validate the length of filenames. A crafted response containing an overly long filename can overwrite the Structured Exception Handler (SEH), potentially allowing remote code execution.
by Metasploit
CVE-2010-20007 EXPLOITDB HIGH ruby VERIFIED
Seagull FTP Client <= v3.3 Build 409 - Buffer Overflow
Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.
by Metasploit
CVE-2010-10014 EXPLOITDB HIGH ruby VERIFIED
Odin Secure FTP <= 4.1 - Buffer Overflow
Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.
by Metasploit
EIP-2026-119564 EXPLOITDB ruby VERIFIED
AASync 2.2.1.0 (Windows x86) - Remote Stack Buffer Overflow 'LIST' (Metasploit)
by Metasploit
EIP-2026-119562 EXPLOITDB ruby VERIFIED
32bit FTP Client - Remote Stack Buffer Overflow (Metasploit)
by Metasploit
CVE-2001-1320 EXPLOITDB ruby VERIFIED
Network Associates PGP Keyserver 7.0 - DoS, RCE
Network Associates PGP Keyserver 7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via exceptional BER encodings (possibly buffer overflows), as demonstrated by the PROTOS LDAPv3 test suite.
by Metasploit
CVE-2010-4741 EXPLOITDB ruby VERIFIED
Moxa Device Manager <2.3 - Buffer Overflow
Stack-based buffer overflow in MDMUtil.dll in MDMTool.exe in MDM Tool before 2.3 in Moxa Device Manager allows remote MDM Gateways to execute arbitrary code via crafted data in a session on TCP port 54321.
by Metasploit