Exploitdb Exploits
31,344 exploits tracked across all sources.
Mysql < 5.1.48 - Denial of Service
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.
by Bjorn Munch
SonicWALL E-Class SSL-VPN - ActiveX Control Format String Overflow
by Nikolas Sotiriu
Syntax Highlighter 3.0.83 - 'index.html' HTML Injection
by indoushka
Cacti < 0.8.7f - XSS
Cross-site scripting (XSS) vulnerability in utilities.php in Cacti before 0.8.7g, as used in Red Hat High Performance Computing (HPC) Solution and other products, allows remote attackers to inject arbitrary web script or HTML via the filter parameter.
by Marc Schoenefeld
Mysql - Denial of Service
Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure.
by Boris Reisig
Nagios XI - 'login.php' Multiple Cross-Site Scripting Vulnerabilities
by Adam Baldwin
Enemy Territory: Quake Wars 1.5.12642.33243 - Remote Buffer Overflow
by Luigi Auriemma
Joomla! Component com_dirfrm - Multiple SQL Injections
by Hieuneo
Dustincowell Free Simple Cms - Code Injection
Multiple PHP remote file inclusion vulnerabilities in themes/default/index.php in Free Simple CMS 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the (1) meta or (2) phpincdir parameter, a different issue than CVE-2010-3307.
by Dr.$audi
Microsoft Windows Server 2008 - Resource Management Error
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
by Piotr Bania
Microsoft Windows - Win32k!xxxRealDrawMenuItem() Missing HBITMAP Bounds Checks
by Tavis Ormandy
Microsoft Windows 2003 Server - Improper Input Validation
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate an unspecified system-call argument, which allows local users to cause a denial of service (system hang) via a crafted application, aka "Win32k Bounds Checking Vulnerability."
by Tavis Ormandy
Microsoft Windows 7 - Improper Input Validation
The kernel in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate ACLs on kernel objects, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Improper Validation Vulnerability."
by Tavis Ormandy
Microsoft Windows XP - Race Condition
Race condition in the kernel in Microsoft Windows XP SP3 allows local users to gain privileges via vectors involving thread creation, aka "Windows Kernel Data Initialization Vulnerability."
by Tavis Ormandy
Microsoft Windows Server 2008 - Resource Management Error
Double free vulnerability in the kernel in Microsoft Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2, allows local users to gain privileges via a crafted application, related to object initialization during error handling, aka "Windows Kernel Double Free Vulnerability."
by Tavis Ormandy
CVSS 7.8
Dustincowell Free Simple Software - SQL Injection
SQL injection vulnerability in the download module in Free Simple Software 1.0 allows remote attackers to execute arbitrary SQL commands via the downloads_id parameter in a download_now action to index.php.
by Dr.$audi
Joomla! Component com_ongallery - SQL Injection
by al bayraqim
Joomla! Component com_jgrid 1.0 - Local File Inclusion
by Salvatore Fresta
Joomla! - SQL Injection
SQL injection vulnerability in the Weblinks (com_weblinks) component in Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter in a categories action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
by ViRuS Qalaa
By Source