Exploitdb Exploits

49,996 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-25316 EXPLOITDB CRITICAL text
Tenda W308R v2 V5.07.48 Cookie Session Weakness DNS Change
Tenda W308R v2 V5.07.48 contains a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation. Attackers can send GET requests to the goform/AdvSetDns endpoint with a crafted admin language cookie to change DNS servers and redirect user traffic to malicious sites.
by Todor Donev
CVSS 9.8
CVE-2018-25315 EXPLOITDB HIGH python
Alloksoft Video joiner 4.6.1217 Buffer Overflow via License Name
Alloksoft Video joiner 4.6.1217 contains a buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the License Name field. Attackers can craft a payload with structured exception handler (SEH) overwrite and shellcode to achieve code execution when the application processes the license registration input.
by Mohan Ravichandran and Velayutham Selvaraj
CVSS 8.4
CVE-2018-25314 EXPLOITDB HIGH python
Allok soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 Buffer Overflow
Allok soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 contains a buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized string in the License Name field. Attackers can craft a malicious input containing shellcode with structured exception handler (SEH) overwrite to bypass protections and execute code with application privileges.
by Mohan Ravichandran and Velayutham Selvaraj
CVSS 8.4
CVE-2018-25313 EXPLOITDB MEDIUM python
SysGauge 4.5.18 Local Denial of Service via Proxy Configuration
SysGauge 4.5.18 contains a buffer overflow vulnerability in the proxy configuration handler that allows local attackers to cause a denial of service by supplying an oversized string. Attackers can inject a large payload through the Proxy Server Host Name field in the Options menu to crash the application.
by Hashim Jawad
CVSS 6.2
CVE-2018-25114 EXPLOITDB CRITICAL python VERIFIED
osCommerce Online Merchant <2.3.4.1 - RCE
A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, the /install/ directory remains accessible after installation. An unauthenticated attacker can invoke install_4.php, submit crafted POST data, and inject arbitrary PHP code into the configure.php file. When the application later includes this file, the injected payload is executed, resulting in full server-side compromise.
by Simon Scannell
CVE-2018-9115 EXPLOITDB MEDIUM python
Systematicinc Sitaware - Improper Input Validation
Systematic SitaWare 6.4 SP2 does not validate input from other sources sufficiently. e.g., information utilizing the NVG interface. An attacker can freeze the Situational Layer, which means that the Situational Picture is no longer updated. Unfortunately, the user cannot notice until he tries to work with that layer.
by 2u53
CVSS 5.3
EIP-2026-118243 EXPLOITDB python
Advantech WebAccess < 8.1 - webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow
by Chris Lyne
EIP-2026-117158 EXPLOITDB python
Faleemi Windows Desktop Software - (DDNS/IP) Local Buffer Overflow
by Himavanth Reddy
EIP-2026-116758 EXPLOITDB python
Allok AVI DivX MPEG to DVD Converter 2.6.1217 - Buffer Overflow (SEH)
by wetw0rk
CVE-2018-8719 EXPLOITDB MEDIUM text
WP Security Audit Log <3.1.1 - Info Disclosure
An issue was discovered in the WP Security Audit Log plugin 3.1.1 for WordPress. Access to wp-content/uploads/wp-security-audit-log/* files is not restricted. For example, these files are indexed by Google and allows for attackers to possibly find sensitive information.
by Colette Chamberland
CVSS 5.3
CVE-2018-9034 EXPLOITDB MEDIUM text
Relevanssi < 4.0.4 - XSS
Cross-site scripting (XSS) vulnerability in lib/interface.php of the Relevanssi plugin 4.0.4 for WordPress allows remote attackers to inject arbitrary JavaScript or HTML via the tab GET parameter.
by Stefan Broeder
CVSS 5.4
CVE-2018-9035 EXPLOITDB CRITICAL text
Contact Form 7 to Database Ext <2.10.32 - Code Injection
CSV Injection vulnerability in ExportToCsvUtf8.php of the Contact Form 7 to Database Extension plugin 2.10.32 for WordPress allows remote attackers to inject spreadsheet formulas into CSV files via the contact form.
by Stefan Broeder
CVSS 9.6
CVE-2016-1713 EXPLOITDB HIGH ruby
Vtiger CRM 6.4.0 - RCE
Unrestricted file upload vulnerability in the Settings_Vtiger_CompanyDetailsSave_Action class in modules/Settings/Vtiger/actions/CompanyDetailsSave.php in Vtiger CRM 6.4.0 allows remote authenticated users to execute arbitrary code by uploading a crafted image file with an executable extension, then accessing it via a direct request to the file in test/logo/. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6000.
by Touhid M.Shaikh
CVSS 7.3
CVE-2018-9092 EXPLOITDB HIGH html
1234n Minicms - CSRF
There is a CSRF vulnerability in mc-admin/conf.php in MiniCMS 1.10 that can change the administrator account password.
by zixian
CVSS 8.8
CVE-2018-9106 EXPLOITDB HIGH text VERIFIED
AcySMS <3.5.1 - CSV Injection
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in the export feature in the Acyba AcySMS extension before 3.5.1 for Joomla! via a value that is mishandled in a CSV export.
by Sureshbabu Narvaneni
CVSS 8.8
CVE-2018-9107 EXPLOITDB HIGH text VERIFIED
Acyba AcyMailing <5.9.6 - CSV Injection
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in the export feature in the Acyba AcyMailing extension before 5.9.6 for Joomla! via a value that is mishandled in a CSV export.
by Sureshbabu Narvaneni
CVSS 8.8
CVE-2018-9032 EXPLOITDB CRITICAL text
Dlink Dir-850l Firmware < 2.06 - Authentication Bypass
An authentication bypass vulnerability on D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router (Hardware Version : A1, B1; Firmware Version : 1.02-2.06) devices potentially allows attackers to bypass SharePort Web Access Portal by directly visiting /category_view.php or /folder_view.php.
by Gem George
CVSS 9.8
CVE-2018-8979 EXPLOITDB HIGH text
Open-audit - CSRF
Open-AudIT Professional 2.1 has CSRF, as demonstrated by modifying a user account or inserting XSS sequences via the credentials URI.
by Nilesh Sapariya
CVSS 8.8
CVE-2018-7297 EXPLOITDB CRITICAL ruby
Eq-3 Homematic Central Control Unit C... - Remote Code Execution
Remote Code Execution in the TCL script interpreter in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to obtain read/write access and execute system commands on the device. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
by Patrick Muench and Gregor Kopf
CVSS 9.8
CVE-2018-7300 EXPLOITDB CRITICAL ruby
Eq-3 Homematic Ccu2 Firmware < 2.29.22 - Path Traversal
Directory Traversal / Arbitrary File Write / Remote Code Execution in the User.setLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to write arbitrary files to the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
by Patrick Muench and Gregor Kopf
CVSS 9.8
EIP-2026-100586 EXPLOITDB text
Tenda W316R Wireless Router 5.07.50 - Remote DNS Change
by Todor Donev
CVE-2018-5955 EXPLOITDB CRITICAL ruby VERIFIED
GitStack <2.3.10 - Privilege Escalation
An issue was discovered in GitStack through 2.3.10. User controlled input is not sufficiently filtered, allowing an unauthenticated attacker to add a user to the server via the username and password fields to the rest/user/ URI.
by Metasploit
CVSS 9.8
CVE-2018-1000006 EXPLOITDB HIGH ruby VERIFIED
Atom Electron < 1.7.10 - OS Command Injection
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
by Metasploit
CVSS 8.8
CVE-2017-8917 EXPLOITDB CRITICAL ruby VERIFIED
Joomla! <3.7.1 - SQL Injection
SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary SQL commands via unspecified vectors.
by Metasploit
CVSS 9.8
CVE-2018-0171 EXPLOITDB CRITICAL python
Cisco Ios - Out-of-Bounds Write
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.
by embedi
CVSS 9.8