Exploitdb Exploits

49,989 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-117292 EXPLOITDB ruby
HTML5 Video Player 1.2.5 - Buffer Overflow (Metasploit)
by d3ckx1
EIP-2026-117291 EXPLOITDB ruby
HTML5 Video Player 1.2.5 - Buffer Overflow (Metasploit)
by d3ckx1
CVE-2018-8552 EXPLOITDB HIGH html VERIFIED
Internet Explorer <11 - Info Disclosure
An information disclosure vulnerability exists when VBScript improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer or data, aka "Windows Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10.
by Google Security Research
CVSS 7.5
CVE-2018-8544 EXPLOITDB HIGH html VERIFIED
Windows VBScript Engine - RCE
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
by Google Security Research
CVSS 8.8
CVE-2018-19277 EXPLOITDB HIGH text
PHPOffice PhpSpreadsheet <1.5.0 - XSS
securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file
by Alex Leahu
CVSS 8.8
CVE-2018-14665 EXPLOITDB MEDIUM bash
xorg-x11-server <1.20.3 - Privilege Escalation
A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
by Marco Ivaldi
CVSS 6.6
EIP-2026-102659 EXPLOITDB c
Linux Kernel 4.8 (Ubuntu 16.04) - Leak sctp Kernel Pointer
by Jinbum Park
EIP-2026-102337 EXPLOITDB ruby VERIFIED
Apache Spark - (Unauthenticated) Command Execution (Metasploit)
by Metasploit
EIP-2026-102336 EXPLOITDB ruby VERIFIED
Apache Spark - (Unauthenticated) Command Execution (Metasploit)
by Metasploit
CVE-2017-6026 EXPLOITDB CRITICAL python
Schneider Electric Modicon PLCs <4.0.5.11 - Info Disclosure
A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The session numbers generated by the web application are lacking randomization and are shared between several users. This may allow a current session to be compromised.
by Photubias
CVSS 9.1
EIP-2026-104102 EXPLOITDB ruby VERIFIED
TeamCity Agent - XML-RPC Command Execution (Metasploit)
by Metasploit
EIP-2026-104101 EXPLOITDB ruby VERIFIED
TeamCity Agent - XML-RPC Command Execution (Metasploit)
by Metasploit
CVE-2018-4416 EXPLOITDB HIGH javascript VERIFIED
Apple Safari < 12.0.1 - Memory Corruption
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
by Google Security Research
CVSS 8.8
CVE-2018-4386 EXPLOITDB HIGH javascript VERIFIED
Apple Safari < 12.0.1 - Memory Corruption
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
by Google Security Research
CVSS 8.8
CVE-2018-4382 EXPLOITDB HIGH javascript VERIFIED
Apple Safari < 12.0.1 - Memory Corruption
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
by Google Security Research
CVSS 8.8
CVE-2018-4237 EXPLOITDB HIGH ruby VERIFIED
Mac OS X libxpc MITM Privilege Escalation
An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "libxpc" component. It allows attackers to gain privileges via a crafted app that leverages a logic error.
by Metasploit
CVSS 7.8
CVE-2018-19518 EXPLOITDB HIGH ruby VERIFIED
University of Washington IMAP Toolkit 2007f - Command Injection
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
by Metasploit
CVSS 7.5
CVE-2018-6329 EXPLOITDB CRITICAL ruby VERIFIED
Unitrends Backup < 10.1.10 - SQL Injection
It was discovered that the Unitrends Backup (UB) before 10.1.0 libbpext.so authentication could be bypassed with a SQL injection, allowing a remote attacker to place a privilege escalation exploit on the target system and subsequently execute arbitrary commands.
by Metasploit
CVSS 9.8
CVE-2018-18955 EXPLOITDB HIGH ruby VERIFIED
Linux Nested User Namespace idmap Limit Local Privilege Escalation
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the namespace, as demonstrated by reading /etc/shadow. This occurs because an ID transformation takes place properly for the namespaced-to-kernel direction but not for the kernel-to-namespaced direction.
by Metasploit
CVSS 7.0
CVE-2016-1555 EXPLOITDB CRITICAL ruby VERIFIED
Netgear Devices Unauthenticated Remote Command Execution
(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands.
by Metasploit
CVSS 9.8
CVE-2018-25272 EXPLOITDB CRITICAL python
ELBA5 5.8.0 Remote Code Execution via Database Access
ELBA5 5.8.0 contains a remote code execution vulnerability that allows attackers to obtain database credentials and execute arbitrary commands with SYSTEM level permissions. Attackers can connect to the database using default connector credentials, decrypt the DBA password, and execute commands via the xp_cmdshell stored procedure or add backdoor users to the BEDIENER table.
by Florian Bogner
CVSS 9.8
CVE-2018-19564 EXPLOITDB MEDIUM text
Easy Testimonials <3.2 - XSS
Stored XSS was discovered in the Easy Testimonials plugin 3.2 for WordPress. Three wp-admin/post.php parameters (_ikcf_client and _ikcf_position and _ikcf_other) have Cross-Site Scripting.
by En_dust
CVSS 6.1
EIP-2026-119515 EXPLOITDB text
Arm Whois 3.11 - Buffer Overflow (ASLR)
by zephyr
EIP-2026-119514 EXPLOITDB text
Arm Whois 3.11 - Buffer Overflow (ASLR)
by zephyr
CVE-2018-18923 EXPLOITDB CRITICAL text
Abisoftgt Ticketly - SQL Injection
AbiSoft Ticketly 1.0 is affected by multiple SQL Injection vulnerabilities through the parameters name, category_id and description in action/addproject.php; kind_id, priority_id, project_id, status_id and title in action/addticket.php; and kind_id and status_id in reports.php.
by Javier Olmedo
CVSS 9.8