Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-117616 EXPLOITDB ruby VERIFIED
MiniShare 1.5.5 - 'users.txt' Local Buffer Overflow (SEH)
by Muhamad Fadzil Ramli
CVE-2010-3654 EXPLOITDB ruby VERIFIED
Adobe Flash Player
Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.
by Metasploit
EIP-2026-111105 EXPLOITDB ruby
PHPKit 1.6.1 R2 - 'overview.php' SQL Injection
by Easy Laster
EIP-2026-109766 EXPLOITDB ruby VERIFIED
mygamingladder MGL Combo System 7.5 - 'game.php' SQL Injection
by Easy Laster
CVE-2010-3585 EXPLOITDB ruby VERIFIED
Oracle VM Server Virtual Server Agent Command Injection
Unspecified vulnerability in the OracleVM component in Oracle VM 2.2.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to ovs-agent. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a third party researcher that this is related to the exposure of unspecified functions using XML-RPC.
by Metasploit
CVE-2010-3653 EXPLOITDB ruby VERIFIED
Adobe Shockwave Player < 11.5.8.612 - Memory Corruption
The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.
by Metasploit
CVE-2010-3332 EXPLOITDB ruby VERIFIED
Microsoft .NET Framework - Info Disclosure
Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
by Agustin Azubel
EIP-2026-118970 EXPLOITDB ruby VERIFIED
Novell iManager - 'getMultiPartParameters' Arbitrary File Upload (Metasploit)
by Metasploit
EIP-2026-118413 EXPLOITDB ruby
Disk Pulse Server 2.2.34 - 'GetServerInfo' Remote Buffer Overflow (Metasploit)
by James Fitts
CVE-2007-1036 EXPLOITDB ruby VERIFIED
JBoss - Auth Bypass
The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests.
by Metasploit
CVE-2009-4962 EXPLOITDB ruby VERIFIED
Adammo Fat Player - Memory Corruption
Stack-based buffer overflow in Fat Player 0.6b allows remote attackers to execute arbitrary code via a long string in a .wav file. NOTE: some of these details are obtained from third party information.
by James Fitts
CVE-2000-0322 EXPLOITDB ruby VERIFIED
Red Hat Piranha - Command Injection
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
by Metasploit
CVE-2010-3332 EXPLOITDB ruby VERIFIED
Microsoft .NET Framework - Info Disclosure
Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
by Agustin Azubel
CVE-2008-1697 EXPLOITDB ruby VERIFIED
HP OpenView Network Node Manager <7.53-7.51 - Buffer Overflow
Stack-based buffer overflow in ovwparser.dll in HP OpenView Network Node Manager (OV NNM) 7.53, 7.51, and earlier allows remote attackers to execute arbitrary code via a long URI in an HTTP request processed by ovas.exe, as demonstrated by a certain topology/homeBaseView request. NOTE: some of these details are obtained from third party information.
by Metasploit
CVE-2010-2618 EXPLOITDB ruby VERIFIED
Insanevisions Adapcms - Code Injection
PHP remote file inclusion vulnerability in inc/smarty/libs/init.php in AdaptCMS 2.0.0 Beta, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the sitepath parameter. NOTE: it was later reported that 2.0.1 is also affected.
by v3n0m
CVE-2009-10006 EXPLOITDB CRITICAL ruby VERIFIED
UFO: Alien Invasion <2.2.1 - RCE
UFO: Alien Invasion versions up to and including 2.2.1 contain a buffer overflow vulnerability in its built-in IRC client component. When the client connects to an IRC server and receives a crafted numeric reply (specifically a 001 message), the application fails to properly validate the length of the response string. This results in a stack-based buffer overflow, which may corrupt control flow structures and allow arbitrary code execution. The vulnerability is triggered during automatic IRC connection handling and does not require user interaction beyond launching the game.
by Metasploit
CVE-2009-10005 EXPLOITDB HIGH ruby VERIFIED
ContentKeeper Web Appliance <125.10 - Path Traversal
ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files from the filesystem. By crafting a POST request to /cgi-bin/ck/mimencode with traversal and output parameters, attackers can read sensitive files such as /etc/passwd outside the webroot.
by Metasploit
EIP-2026-119232 EXPLOITDB ruby VERIFIED
UFO: Alien Invasion IRC Client (Windows) - Remote Buffer Overflow (Metasploit)
by Metasploit
CVE-2010-2309 EXPLOITDB ruby VERIFIED
Evological Evocam - Memory Corruption
Buffer overflow in the web server for EvoLogical EvoCam 3.6.6 and 3.6.7 allows remote attackers to execute arbitrary code via a long GET request.
by Metasploit
CVE-2007-6166 EXPLOITDB ruby VERIFIED
Apple QuickTime <7.3.1 - Buffer Overflow
Stack-based buffer overflow in Apple QuickTime before 7.3.1, as used in QuickTime Player on Windows XP and Safari on Mac OS X, allows remote Real Time Streaming Protocol (RTSP) servers to execute arbitrary code via an RTSP response with a long Content-Type header.
by Metasploit
CVE-2010-2309 EXPLOITDB ruby VERIFIED
Evological Evocam - Memory Corruption
Buffer overflow in the web server for EvoLogical EvoCam 3.6.6 and 3.6.7 allows remote attackers to execute arbitrary code via a long GET request.
by Metasploit
CVE-2007-5208 EXPLOITDB ruby VERIFIED
HP Linux Imaging And Printing Project - Improper Input Validation
hpssd in Hewlett-Packard Linux Imaging and Printing Project (hplip) 1.x and 2.x before 2.7.10 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a from address, which is not properly handled when invoking sendmail.
by Metasploit
CVE-2007-4560 EXPLOITDB ruby VERIFIED
ClamAV <0.91.2 - RCE
clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
by Metasploit
CVE-2002-1473 EXPLOITDB ruby VERIFIED
HP-UX <11.11 - Buffer Overflow
Multiple buffer overflows in lp subsystem for HP-UX 10.20 through 11.11 (11i) allow local users to cause a denial of service and possibly execute arbitrary code.
by Metasploit
CVE-2003-0727 EXPLOITDB ruby VERIFIED
Oracle 9i Database Release 2 - Buffer Overflow
Multiple buffer overflows in the XML Database (XDB) functionality for Oracle 9i Database Release 2 allow local users to cause a denial of service or hijack user sessions.
by Metasploit