Exploitdb Exploits

31,337 exploits tracked across all sources.

Sort: Activity Stars
CVE-2015-8730 EXPLOITDB MEDIUM text VERIFIED
Wireshark - Improper Input Validation
epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
by Google Security Research
CVSS 5.5
CVE-2015-8740 EXPLOITDB MEDIUM text VERIFIED
Wireshark - Improper Input Validation
The dissect_tds7_colmetadata_token function in epan/dissectors/packet-tds.c in the TDS dissector in Wireshark 2.0.x before 2.0.1 does not validate the number of columns, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
by Google Security Research
CVSS 5.3
CVE-2015-8731 EXPLOITDB MEDIUM text VERIFIED
Wireshark - Improper Input Validation
The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
by Google Security Research
CVSS 5.5
CVE-2015-8729 EXPLOITDB MEDIUM text VERIFIED
Wireshark - Improper Input Validation
The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
by Google Security Research
CVSS 5.5
CVE-2015-8723 EXPLOITDB MEDIUM text VERIFIED
Wireshark - Memory Corruption
The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
by Google Security Research
CVSS 5.5
CVE-2015-8727 EXPLOITDB MEDIUM text VERIFIED
Wireshark - Improper Input Validation
The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
by Google Security Research
CVSS 5.5
EIP-2026-102341 EXPLOITDB text VERIFIED
FireEye - Wormable Remote Code Execution in MIP JAR Analysis
by Tavis Ormandy & Natalie Silvanovich
EIP-2026-112598 EXPLOITDB text VERIFIED
Tequila File Hosting 1.5 - Multiple Vulnerabilities
by Ashiyane Digital Security Team
EIP-2026-110420 EXPLOITDB text
Ovidentia bulletindoc Module 2.9 - Multiple Remote File Inclusions
by bd0rk
EIP-2026-110419 EXPLOITDB text
Ovidentia absences Module 2.64 - Remote File Inclusion
by bd0rk
EIP-2026-105250 EXPLOITDB text VERIFIED
ArticleSetup Article Script 1.00 - SQL Injection
by Linux Zone Research Team
CVE-2015-6132 EXPLOITDB text VERIFIED
Microsoft Windows 10 - Access Control
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability."
by Google Security Research
EIP-2026-113536 EXPLOITDB text
WordPress Plugin Admin Management Xtended 2.4.0 - Privilege escalation
by Kacper Szurek
EIP-2026-106760 EXPLOITDB text VERIFIED
ECommerceMajor - 'productdtl.php?prodid' SQL Injection
by Rahul Pratap Singh
CVE-2015-8357 EXPLOITDB text
Bitrix <1.0.4 - Path Traversal
Directory traversal vulnerability in the bitrix.xscan module before 1.0.4 for Bitrix allows remote authenticated users to rename arbitrary files, and consequently obtain sensitive information or cause a denial of service, via a .. (dot dot) in the file parameter to admin/bitrix.xscan_worker.php.
by High-Tech Bridge SA
CVE-2015-8358 EXPLOITDB text
Bitrix <1.0.12 - Path Traversal
Directory traversal vulnerability in the bitrix.mpbuilder module before 1.0.12 for Bitrix allows remote administrators to include and execute arbitrary local files via a .. (dot dot) in the element name of the "work" array parameter to admin/bitrix.mpbuilder_step2.php.
by High-Tech Bridge SA
CVE-2015-7648 EXPLOITDB text VERIFIED
Adobe Flash Player <18.0.0.255,19.x<19.0.0.226 - RCE
Adobe Flash Player before 18.0.0.255 and 19.x before 19.0.0.226 on Windows and OS X and before 11.2.202.540 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-7647.
by Google Security Research
CVE-2015-7647 EXPLOITDB text VERIFIED
Adobe Flash Player <18.0.0.255,19.x<19.0.0.226 - RCE
Adobe Flash Player before 18.0.0.255 and 19.x before 19.0.0.226 on Windows and OS X and before 11.2.202.540 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-7648.
by Google Security Research
EIP-2026-101927 EXPLOITDB text VERIFIED
Polycom VVX-Series Business Media Phones - Directory Traversal
by Jake Reynolds
EIP-2026-107448 EXPLOITDB text
GoAutoDial CE 3.3 - Multiple SQL Injections / Command Injection
by R-73eN
EIP-2026-114956 EXPLOITDB text VERIFIED
Avast! - Integer Overflow Verifying numFonts in TTC Header
by Google Security Research
EIP-2026-108026 EXPLOITDB text VERIFIED
iy10 Dizin Scripti - Multiple Vulnerabilities
by KnocKout
EIP-2026-107452 EXPLOITDB text
Gökhan Balbal Script 2.0 - Cross-Site Request Forgery
by KnocKout
EIP-2026-103644 EXPLOITDB text VERIFIED
Rar - CmdExtract::UnstoreFile Integer Truncation Memory Corruption
by Google Security Research
EIP-2026-103420 EXPLOITDB text VERIFIED
Avast! - Out-of-Bounds Write Decrypting PEncrypt Packed executables
by Google Security Research