Exploitdb Exploits

49,996 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-103233 EXPLOITDB python VERIFIED
Trend Micro Threat Discovery Appliance 2.6.1062r1 - 'dlp_policy_upload.cgi' Remote Code Execution
by mr_me
EIP-2026-101131 EXPLOITDB text
Sony Playstation 3 (PS3) 4.82 - 'Jailbreak' (ROP)
by PS3Xploit
CVE-2016-1542 EXPLOITDB HIGH python
BMC BladeLogic Server Automation <8.7 - Auth Bypass
The RPC API in RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and enumerate users by sending an action packet to xmlrpc after an authorization failure.
by Paul Taylor
CVSS 7.5
CVE-2016-5063 EXPLOITDB MEDIUM python
BMC Server Automation < 8.6 - Improper Authorization
The RSCD agent in BMC Server Automation before 8.6 SP1 Patch 2 and 8.7 before Patch 3 on Windows might allow remote attackers to bypass authorization checks and make an RPC call via unspecified vectors.
by Paul Taylor
CVSS 5.3
EIP-2026-113864 EXPLOITDB text
WordPress Plugin Learning Management System - 'course_id' SQL Injection
by Esecurity.ir
CVE-2016-1543 EXPLOITDB HIGH python
BMC BladeLogic Server Automation <8.8 - Auth Bypass
The RPC API in the RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and reset arbitrary user passwords by sending an action packet to xmlrpc after an authorization failure.
by Paul Taylor
CVSS 7.5
CVE-2018-5720 EXPLOITDB HIGH html
Dodocool Dc38 Firmware - CSRF
An issue was discovered on DODOCOOL DC38 3-in-1 N300 Mini Wireless Range Extend RTN2-AW.GD.R3465.1.20161103 devices. A Cross-site request forgery (CSRF) vulnerability allows remote attackers to hijack the authentication of users for requests that modify all the settings. This vulnerability can lead to changing an existing user's username and password, changing the Wi-Fi password, etc.
by Raffaele Sabato
CVSS 8.8
CVE-2018-1000006 EXPLOITDB HIGH html
Atom Electron < 1.7.10 - OS Command Injection
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
by Wflki
CVSS 8.8
EIP-2026-101529 EXPLOITDB python
ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password
by Víctor Calvo
CVE-2018-6015 EXPLOITDB HIGH html VERIFIED
Email Subscribers & Newsletters <3.4.8 - Info Disclosure
An issue was discovered in the "Email Subscribers & Newsletters" plugin before 3.4.8 for WordPress. Sending an HTTP POST request to a URI with /?es=export at the end, and adding option=view_all_subscribers in the body, allows downloading of a CSV data file with all subscriber data.
by ThreatPress Security
CVSS 7.5
CVE-2017-11317 EXPLOITDB CRITICAL python
Telerik UI For Asp.net Ajax < 2016.3.1027 - Weak Encryption
Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
by Paul Taylor
CVSS 9.8
CVE-2017-7310 EXPLOITDB HIGH ruby VERIFIED
SyncBreeze <10.6 - Buffer Overflow
A buffer overflow vulnerability in Import Command in SyncBreeze before 10.6, DiskSorter before 10.6, DiskBoss before 8.9, DiskPulse before 10.6, DiskSavvy before 10.6, DupScout before 10.6, and VX Search before 10.6 allows attackers to execute arbitrary code via a crafted XML file containing a long name attribute of a classify element.
by Metasploit
CVSS 7.8
CVE-2018-5973 EXPLOITDB CRITICAL text
Professional Local Directory Script 1.0 - SQL Injection
SQL Injection exists in Professional Local Directory Script 1.0 via the sellers_subcategories.php IndustryID parameter, or the suppliers.php IndustryID or CategoryID parameter.
by Ihsan Sencan
CVSS 9.8
CVE-2017-14143 EXPLOITDB CRITICAL ruby VERIFIED
Kaltura <13.2.0 - Code Injection
The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and consequently conduct PHP object injection attacks and execute arbitrary PHP code via a crafted userzone cookie.
by Metasploit
CVSS 9.8
CVE-2017-17562 EXPLOITDB HIGH ruby VERIFIED
Embedthis GoAhead <3.6.5 - Remote Code Execution
Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.
by Metasploit
CVSS 8.1
CVE-2018-2698 EXPLOITDB HIGH
Oracle VM VirtualBox <5.1.32-5.2.6 - RCE
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
by SecuriTeam
CVSS 8.8
CVE-2018-5997 EXPLOITDB CRITICAL python
RAVPower Filehub <2.000.056 - RCE
An issue was discovered in the HTTP Server in RAVPower Filehub 2.000.056. Due to an unrestricted upload feature and a path traversal vulnerability, it is possible to upload a file on a filesystem with root privileges: this will lead to remote code execution as root.
by Daniele Linguaglossa & Stefano Farletti
CVSS 9.8
CVE-2017-9248 EXPLOITDB CRITICAL python
Telerik UI <R2 2017 SP1-10.0.6412.0 - MachineKey Leak
Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
by Paul Taylor
CVSS 9.8
CVE-2017-11357 EXPLOITDB CRITICAL python
Telerik UI For Asp.net Ajax < 2020.1.114 - Unrestricted File Upload
Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
by Paul Taylor
CVSS 9.8
CVE-2017-14355 EXPLOITDB HIGH python VERIFIED
HPE Connected Backup <8.8.6 - Privilege Escalation
A potential security vulnerability has been identified in HPE Connected Backup versions 8.6 and 8.8.6. The vulnerability could be exploited locally to allow escalation of privilege.
by Peter Lapp
CVSS 7.8
EIP-2026-116908 EXPLOITDB text VERIFIED
Blizzard Update Agent - JSON RPC DNS Rebinding
by Google Security Research
EIP-2026-115844 EXPLOITDB python
MixPad 5.00 - Buffer Overflow
by bzyo
CVE-2018-5978 EXPLOITDB CRITICAL text
Facebook Style Php Ajax Chat Zechat 1.5 - SQL Injection
SQL Injection exists in Facebook Style Php Ajax Chat Zechat 1.5 via the login.php User field.
by Ihsan Sencan
CVSS 9.8
CVE-2018-5979 EXPLOITDB CRITICAL text
Wchat Fully Responsive PHP AJAX Chat Script 1.5 - SQL Injection
SQL Injection exists in Wchat Fully Responsive PHP AJAX Chat Script 1.5 via the login.php User field.
by Ihsan Sencan
CVSS 9.8
CVE-2018-5984 EXPLOITDB CRITICAL text
Tumder 2.1 - Joomla! - SQL Injection
SQL Injection exists in the Tumder (An Arcade Games Platform) 2.1 component for Joomla! via the PATH_INFO to the category/ URI.
by Ihsan Sencan
CVSS 9.8