Exploitdb Exploits

49,996 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-116762 EXPLOITDB python
Allok Quicktime to AVI MPEG DVD Converter 4.6.1217 - Stack-Based Buffer Overflow
by Mohan Ravichandran and Velayutham Selvaraj
EIP-2026-116573 EXPLOITDB python
WM Recorder 16.8.1 - Denial of Service
by bzyo
EIP-2026-115183 EXPLOITDB python
Easy Avi Divx Xvid to DVD Burner 2.9.11 - '.avi' Denial of Service
by Hashim Jawad
EIP-2026-115182 EXPLOITDB python
Easy Avi Divx Xvid to DVD Burner 2.9.11 - '.avi' Denial of Service
by Hashim Jawad
CVE-2018-7422 EXPLOITDB HIGH text VERIFIED
Siteeditor Site Editor < 1.1.1 - Path Traversal
A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php, aka absolute path traversal.
by Nicolas Buzy-Debat
CVSS 7.5
EIP-2026-104688 EXPLOITDB python
XenForo 2 - CSS Loader Denial of Service
by LockedByte
CVE-2018-1218 EXPLOITDB HIGH python VERIFIED
Dell Emc Networker < 9.1.1.6 - Memory Corruption
In Dell EMC NetWorker versions prior to 9.2.1.1, versions prior to 9.1.1.6, 9.0.x, and versions prior to 8.2.4.11, the 'nsrd' daemon causes a buffer overflow condition when handling certain messages. A remote unauthenticated attacker could potentially exploit this vulnerability to cause a denial of service to the users of NetWorker systems.
by Marek Cybul
CVSS 7.5
EIP-2026-102050 EXPLOITDB javascript
TL-WR720N 150Mbps Wireless N Router - Cross-Site Request Forgery
by Mans van Someren
CVE-2017-13262 EXPLOITDB MEDIUM python
Google Android - Out-of-Bounds Read
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing length decrement operation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69271284.
by QuarksLab
CVSS 6.5
CVE-2017-13262 EXPLOITDB MEDIUM python
Google Android - Out-of-Bounds Read
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing length decrement operation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69271284.
by QuarksLab
CVSS 6.5
CVE-2018-7273 EXPLOITDB MEDIUM c
Linux Kernel < 4.15.4 - Information Disclosure
In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.
by Gregory Draperi
CVSS 5.5
CVE-2018-0877 EXPLOITDB HIGH text VERIFIED
Windows Desktop Bridge VFS - Privilege Escalation
The Desktop Bridge Virtual File System (VFS) in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how file paths are managed, aka "Windows Desktop Bridge VFS Elevation of Privilege Vulnerability".
by Google Security Research
CVSS 7.8
CVE-2018-0894 EXPLOITDB MEDIUM c++ VERIFIED
Microsoft Windows 10 - Information Disclosure
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
by Google Security Research
CVSS 4.7
CVE-2018-0895 EXPLOITDB MEDIUM c++ VERIFIED
Microsoft Windows 10 - Memory Leak
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
by Google Security Research
CVSS 4.7
CVE-2018-0901 EXPLOITDB MEDIUM c++ VERIFIED
Microsoft Windows 10 - Memory Leak
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, and CVE-2018-0926.
by Google Security Research
CVSS 4.7
CVE-2018-0897 EXPLOITDB MEDIUM c++ VERIFIED
Microsoft Windows 10 - Information Disclosure
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
by Google Security Research
CVSS 4.7
CVE-2018-0882 EXPLOITDB HIGH text VERIFIED
Windows Desktop Bridge - Privilege Escalation
The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0880.
by Google Security Research
CVSS 7.0
CVE-2018-0880 EXPLOITDB HIGH powershell VERIFIED
Windows Desktop Bridge - Privilege Escalation
The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0882.
by Google Security Research
CVSS 7.0
CVE-2018-0891 EXPLOITDB MEDIUM javascript VERIFIED
Microsoft Internet Explorer - Memory Leak
ChakraCore, and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow information disclosure, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0939.
by Google Security Research
CVSS 4.3
CVE-2017-1000474 EXPLOITDB CRITICAL text
Soyket Chowdhury Vehicle Sales Management System 2017-07-30 - RCE
Soyket Chowdhury Vehicle Sales Management System version 2017-07-30 is vulnerable to multiple SQL Injecting in login/vehicle.php, login/profile.php, login/Actions.php, login/manage_employee.php, and login/sell.php scripts resulting in the expose of user's login credentials, SQL Injection and Stored XSS vulnerability, which leads to remote code executing.
by Sing
CVSS 9.8
CVE-2018-0114 EXPLOITDB HIGH python
Cisco Node-jose < 0.11.0 - Signature Verification Bypass
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
by zioBlack
CVSS 7.5
CVE-2018-6084 EXPLOITDB HIGH VERIFIED
Google Chrome <66.0.3359.117 - RCE
Insufficiently sanitized distributed objects in Updater in Google Chrome on macOS prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via an executable file.
by Google Security Research
CVSS 7.8
EIP-2026-103184 EXPLOITDB python
OpenSSH < 6.6 SFTP - Command Execution
by SECFORCE
EIP-2026-102623 EXPLOITDB python
Kamailio 5.1.1 / 5.1.0 / 5.0.0 - Off-by-One Heap Overflow
by EnableSecurity
CVE-2018-9010 EXPLOITDB HIGH python
Intelbras Tip200 Firmware - Path Traversal
Intelbras TELEFONE IP TIP200/200 LITE 60.0.75.29 devices allow remote authenticated admins to read arbitrary files via the /cgi-bin/cgiServer.exx page parameter, aka absolute path traversal. In some cases, authentication can be achieved via the admin account with its default admin password.
by anhax0r
CVSS 7.2