Exploitdb Exploits

2,731 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-118318 EXPLOITDB ruby VERIFIED
BigAnt Server 2.52 - USV Buffer Overflow (Metasploit)
by Metasploit
CVE-2008-1914 EXPLOITDB ruby VERIFIED
BigAnt IM Server <2.2 - Buffer Overflow
Stack-based buffer overflow in the AntServer module (AntServer.exe) in BigAnt IM Server in BigAnt Messenger 2.2 allows remote attackers to execute arbitrary code via a long URI in a request to TCP port 6080. NOTE: some of these details are obtained from third party information.
by Metasploit
EIP-2026-118311 EXPLOITDB ruby VERIFIED
Belkin Bulldog Plus - Web Service Buffer Overflow (Metasploit)
by Metasploit
CVE-2007-5107 EXPLOITDB ruby VERIFIED
Ask.com Ask Toolbar < 4.0.2.53 - Memory Corruption
Stack-based buffer overflow in the AskJeevesToolBar.SettingsPlugin.1 ActiveX control in askBar.dll in IAC Search & Media ask.com Ask Toolbar 4.0.2.53 and earlier allows remote attackers to execute arbitrary code via a long ShortFormat property value. NOTE: some of these details are obtained from third party information. NOTE: the researcher claims that this is the same as CVE-2007-5108, but there is insufficient detail for CVE-2007-5108 to be certain.
by Metasploit
CVE-2007-6166 EXPLOITDB ruby VERIFIED
Apple QuickTime <7.3.1 - Buffer Overflow
Stack-based buffer overflow in Apple QuickTime before 7.3.1, as used in QuickTime Player on Windows XP and Safari on Mac OS X, allows remote Real Time Streaming Protocol (RTSP) servers to execute arbitrary code via an RTSP response with a long Content-Type header.
by Metasploit
CVE-2009-0323 EXPLOITDB ruby VERIFIED
W3C Amaya Web Browser <11.0 - RCE
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.
by Metasploit
CVE-2006-6183 EXPLOITDB ruby VERIFIED
3com 3ctftpsvc < 2.0.1 - Memory Corruption
Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command.
by Metasploit
CVE-2006-6063 EXPLOITDB ruby VERIFIED
Un4seen Xmplay < 3.3.0.5 - Buffer Overflow
Stack-based buffer overflow in Un4seen XMPlay 3.3.0.5 and earlier allows remote attackers to execute arbitrary code via a M3U file containing a long (1) FileName, and cause a crash via a long (2) DisplayName.
by Metasploit
CVE-2005-0043 EXPLOITDB ruby VERIFIED
Apple Itunes - Buffer Overflow
Buffer overflow in Apple iTunes 4.7 allows remote attackers to execute arbitrary code via a long URL in (1) .m3u or (2) .pls playlist files.
by Metasploit
CVE-2004-0313 EXPLOITDB ruby VERIFIED
Psoproxy Server - Buffer Overflow
Buffer overflow in PSOProxy 0.91 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP request, as demonstrated using a long (1) GET argument or (2) method name.
by Metasploit
EIP-2026-111197 EXPLOITDB ruby VERIFIED
phpscripte24 Shop System - SQL Injection
by Easy Laster
CVE-2010-1924 EXPLOITDB ruby VERIFIED
Phpscripte24 Live Shopping Multi Portal System - SQL Injection
SQL injection vulnerability in index.php in Hi Web Wiesbaden Live Shopping Multi Portal System allows remote attackers to execute arbitrary SQL commands via the artikel parameter.
by Easy Laster
EIP-2026-105083 EXPLOITDB ruby VERIFIED
Alibaba Clone Diamond Version - SQL Injection
by Easy Laster
CVE-2009-3504 EXPLOITDB ruby VERIFIED
Alibabaclone Alibaba Clone - SQL Injection
SQL injection vulnerability in offers_buy.php in Alibaba Clone 3.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
by Easy Laster
CVE-2005-0491 EXPLOITDB ruby VERIFIED
Knox Software Arkeia Server Backup - Buffer Overflow
Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote attackers to execute arbitrary code via a long type 77 request.
by Metasploit
CVE-2005-2852 EXPLOITDB ruby VERIFIED
Novell Netware - DoS
Unknown vulnerability in CIFS.NLM in Novell Netware 6.5 SP2 and SP3, 5.1, and 6.0 allows remote attackers to cause a denial of service (ABEND) via an incorrect password length, as exploited by the "worm.rbot.ccc" worm.
by Metasploit
CVE-2008-0226 EXPLOITDB ruby VERIFIED
Oracle Mysql < 1.7.5 - Memory Corruption
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
by Metasploit
CVE-2008-0067 EXPLOITDB ruby VERIFIED
HP Openview Network Node Manager - Memory Corruption
Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allow remote attackers to execute arbitrary code via (1) long string parameters to the OpenView5.exe CGI program; (2) a long string parameter to the OpenView5.exe CGI program, related to ov.dll; or a long string parameter to the (3) getcvdata.exe, (4) ovlaunch.exe, or (5) Toolbar.exe CGI program.
by Metasploit
EIP-2026-117309 EXPLOITDB ruby VERIFIED
IDEAL Migration 4.5.1 - Local Buffer Overflow (Metasploit)
by blake
CVE-2010-2028 EXPLOITDB ruby VERIFIED
Mgenti Tftputil Gui - Memory Corruption
Buffer overflow in k23productions TFTPUtil GUI (aka TFTPGUI) 1.4.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long transport mode.
by Jeremiah Talamantes
CVE-2007-0015 EXPLOITDB ruby VERIFIED
Apple Quicktime - Buffer Overflow
Buffer overflow in Apple QuickTime 7.1.3 allows remote attackers to execute arbitrary code via a long rtsp:// URI.
by Metasploit
CVE-2008-2992 EXPLOITDB HIGH ruby VERIFIED
Adobe Acrobat < 8.1.2 - Out-of-Bounds Write
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
by Metasploit
CVSS 7.8
CVE-2010-20122 EXPLOITDB CRITICAL ruby VERIFIED
Xftp FTP Client <3.0 (build 0238) - Buffer Overflow
Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
by Metasploit
CVE-2010-20121 EXPLOITDB CRITICAL ruby VERIFIED
Easyftp Server < 1.7.0.12 - Stack Buffer Overflow
EasyFTP Server versions up to 1.7.0.11 contain a stack-based buffer overflow vulnerability in the FTP command parser. When processing the CWD (Change Working Directory) command, the server fails to properly validate the length of the input string, allowing attackers to overwrite memory on the stack. This flaw enables remote code execution without authentication, as EasyFTP allows anonymous access by default. The vulnerability was resolved in version 1.7.0.12, after which the product was renamed “UplusFtp.”
by Metasploit
CVSS 9.8
CVE-2004-1373 EXPLOITDB ruby VERIFIED
Nullsoft Shoutcast Server - Denial of Service
Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.
by Metasploit