Exploitdb Exploits

49,996 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-5767 EXPLOITDB CRITICAL python
Tenda AC15 <V15.03.1.16_multi - RCE
An issue was discovered on Tenda AC15 V15.03.1.16_multi devices. A remote, unauthenticated attacker can gain remote code execution on the device with a crafted password parameter for the COOKIE header.
by Tim Carrington
CVSS 9.8
CVE-2018-6928 EXPLOITDB CRITICAL text
News Website Script - SQL Injection
PHP Scripts Mall News Website Script 2.0.4 has SQL Injection via a search term.
by Varun Bagaria
CVSS 9.8
CVE-2018-6892 EXPLOITDB CRITICAL python VERIFIED
Cloudme Sync < 1.10.9 - Memory Corruption
An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the "CloudMe Sync" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution.
by hyp3rlinx
CVSS 9.8
CVE-2018-6911 EXPLOITDB CRITICAL html
Advantech Webaccess - OS Command Injection
The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument (aka the command parameter).
by Nassim Asrir
CVSS 9.8
CVE-2018-6888 EXPLOITDB HIGH html
Typesetter - CSRF
An issue was discovered in Typesetter 5.1. The User Permissions page (aka Admin/Users) suffers from critical flaw of Cross Site Request forgery: using a forged HTTP request, a malicious user can lead a user to unknowingly create / delete or modify a user account due to the lack of an anti-CSRF token.
by Navina Asrani
CVSS 8.0
CVE-2018-6889 EXPLOITDB HIGH text
Typesetter - Code Injection
An issue was discovered in Typesetter 5.1. It suffers from a Host header injection vulnerability, Using this attack, a malicious user can poison the web cache or perform advanced password reset attacks or even trigger arbitrary user re-direction.
by Navina Asrani
CVSS 8.8
CVE-2019-25258 EXPLOITDB HIGH text
LogicalDOC Enterprise 7.7.4 - Info Disclosure
LogicalDOC Enterprise 7.7.4 contains multiple post-authentication file disclosure vulnerabilities that allow attackers to read arbitrary files through unverified 'suffix' and 'fileVersion' parameters. Attackers can exploit directory traversal techniques in /thumbnail and /convertpdf endpoints to access sensitive system files like win.ini and /etc/passwd by manipulating path traversal sequences.
by LiquidWorm
CVSS 7.5
CVE-2019-25257 EXPLOITDB MEDIUM text
LogicalDOC Enterprise 7.7.4 - Command Injection
LogicalDOC Enterprise 7.7.4 contains multiple authenticated OS command execution vulnerabilities that allow attackers to manipulate binary paths when changing system settings. Attackers can exploit these vulnerabilities by modifying configuration parameters like antivirus.command, ocr.Tesseract.path, and other system paths to execute arbitrary system commands with elevated privileges.
by LiquidWorm
CVSS 6.5
CVE-2010-3847 EXPLOITDB ruby VERIFIED
glibc LD_AUDIT Arbitrary DSO Load Privilege Escalation
elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
by Metasploit
CVE-2017-9232 EXPLOITDB CRITICAL ruby VERIFIED
Juju <2.1.3 - Privilege Escalation
Juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a UNIX domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.
by Metasploit
CVSS 9.8
CVE-2010-3856 EXPLOITDB ruby VERIFIED
GNU Glibc < 2.11.2 - Access Control
ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
by Metasploit
CVE-2010-3847 EXPLOITDB ruby VERIFIED
glibc LD_AUDIT Arbitrary DSO Load Privilege Escalation
elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
by Metasploit
EIP-2026-102396 EXPLOITDB text
LogicalDOC Enterprise 7.7.4 - User Enumeration
by LiquidWorm
EIP-2026-111700 EXPLOITDB text
Readymade Video Sharing Script 3.2 - 'search' SQL Injection
by Varun Bagaria
EIP-2026-110503 EXPLOITDB text
Paypal Clone Script 1.0.9 - 'id' / 'acctype' SQL Injection
by L0RD
EIP-2026-109838 EXPLOITDB text
Naukri Clone Script 3.0.3 - 'indus' SQL Injection
by L0RD
CVE-2018-6845 EXPLOITDB MEDIUM text
Olx Clone Script - XSS
PHP Scripts Mall Multi Language Olx Clone Script 2.0.6 has XSS via the Leave Comment field.
by Varun Bagaria
CVSS 6.1
CVE-2018-6871 EXPLOITDB CRITICAL
LibreOffice <5.4.5 & 6.x <6.0.1 - Info Disclosure
LibreOffice before 5.4.5 and 6.x before 6.0.1 allows remote attackers to read arbitrary files via =WEBSERVICE calls in a document, which use the COM.MICROSOFT.WEBSERVICE function.
by Mikhail Klementev
CVSS 9.8
CVE-2018-4083 EXPLOITDB HIGH c VERIFIED
Apple Mac OS X < 10.13.3 - Memory Corruption
An issue was discovered in certain Apple products. macOS before 10.13.3 is affected. The issue involves the "Touch Bar Support" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
by Google Security Research
CVSS 7.8
CVE-2017-3066 EXPLOITDB CRITICAL python
Adobe Coldfusion - Insecure Deserialization
Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution.
by Faisal Tameesh
CVSS 9.8
CVE-2018-6606 EXPLOITDB HIGH c
Malwarefox Antimalware - Incorrect Permission Assignment
An issue was discovered in MalwareFox AntiMalware 2.74.0.150. Improper access control in zam32.sys and zam64.sys allows a non-privileged process to register itself with the driver by sending IOCTL 0x80002010 and then using IOCTL 0x8000204C to \\.\ZemanaAntiMalware to elevate privileges.
by Souhail Hammou
CVSS 7.8
EIP-2026-110189 EXPLOITDB text VERIFIED
Online Test Script 2.0.7 - 'cid' SQL Injection
by L0RD
EIP-2026-106890 EXPLOITDB text VERIFIED
Entrepreneur Dating Script 2.0.2 - Authentication Bypass
by L0RD
CVE-2017-17090 EXPLOITDB HIGH python VERIFIED
Asterisk Open Source <15.1.2 - DoS
An issue was discovered in chan_skinny.c in Asterisk Open Source 13.18.2 and older, 14.7.2 and older, and 15.1.2 and older, and Certified Asterisk 13.13-cert7 and older. If the chan_skinny (aka SCCP protocol) channel driver is flooded with certain requests, it can cause the asterisk process to use excessive amounts of virtual memory, eventually causing asterisk to stop processing requests of any kind.
by Juan Sacco
CVSS 7.5
CVE-2018-0101 EXPLOITDB CRITICAL python
Cisco Adaptive Security Appliance Software < 9.1.7.23 - Double Free
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device. This vulnerability affects Cisco ASA Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, Firepower Threat Defense Software (FTD). Cisco Bug IDs: CSCvg35618.
by Sean Dillon
CVSS 10.0