Exploitdb Exploits

49,996 exploits tracked across all sources.

Sort: Activity Stars
CVE-2016-2386 EXPLOITDB CRITICAL python
SAP Netweaver Application Server Java - SQL Injection
SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079.
by Vahagn Vardanyan
CVSS 9.8
CVE-2017-5817 EXPLOITDB CRITICAL ruby VERIFIED
HP Intelligent Management Center < 7.3 - Improper Input Validation
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found.
by Metasploit
CVSS 9.8
CVE-2017-5816 EXPLOITDB CRITICAL ruby VERIFIED
HP Intelligent Management Center < 7.3 - Improper Input Validation
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found.
by Metasploit
CVSS 9.8
CVE-2018-5262 EXPLOITDB CRITICAL python
Flexense DiskBoss <8.8.16 - Buffer Overflow
A stack-based buffer overflow in Flexense DiskBoss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account.
by Arris Huijgen
CVSS 9.8
CVE-2018-5189 EXPLOITDB HIGH c++
Jungo Windriver 12.5.1 - Privilege Escalation
Race condition in Jungo Windriver 12.5.1 allows local users to cause a denial of service (buffer overflow) or gain system privileges by flipping pool buffer size, aka a "double fetch" vulnerability.
by Fidus InfoSecurity
CVSS 7.8
CVE-2018-0758 EXPLOITDB HIGH javascript VERIFIED
Microsoft Chakracore < 1.7.6 - Out-of-Bounds Write
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
by Google Security Research
CVSS 7.5
EIP-2026-114199 EXPLOITDB text
WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery
by Panagiotis Vagenas
EIP-2026-114071 EXPLOITDB text
WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery
by Panagiotis Vagenas
EIP-2026-114034 EXPLOITDB text
WordPress Plugin Service Finder Booking < 3.2 - Local File Disclosure
by telahdihapus
CVE-2018-5315 EXPLOITDB CRITICAL text
Wachipi WP Events Calendar <1.0 - SQL Injection
The Wachipi WP Events Calendar plugin 1.0 for WordPress has SQL Injection via the event_id parameter to event.php.
by Dennis Veninga
CVSS 9.8
EIP-2026-113632 EXPLOITDB text
WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation
by Panagiotis Vagenas
EIP-2026-113537 EXPLOITDB text
WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation
by Panagiotis Vagenas
EIP-2026-112532 EXPLOITDB ruby
Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
by James Bercegay
CVE-2017-17970 EXPLOITDB CRITICAL text
Muviko - SQL Injection
Multiple SQL injection vulnerabilities in Muviko 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to login.php; the (2) season_id parameter to themes/flixer/ajax/load_season.php; the (3) movie_id parameter to themes/flixer/ajax/get_rating.php; the (4) rating or (5) movie_id parameter to themes/flixer/ajax/update_rating.php; or the (6) id parameter to themes/flixer/ajax/set_player_source.php.
by Ahmad Mahfouz
CVSS 9.8
CVE-2018-5263 EXPLOITDB MEDIUM text VERIFIED
Joomla! - com_easydiscuss <4.0.21 - XSS
The StackIdeas EasyDiscuss (aka com_easydiscuss) extension before 4.0.21 for Joomla! allows XSS.
by Mattia Furlani
CVSS 5.4
CVE-2016-2388 EXPLOITDB MEDIUM python
SAP Netweaver Application Server Java < 7.50 - Information Disclosure
The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846.
by Vahagn Vardanyan
CVSS 5.3
CVE-2017-18016 EXPLOITDB MEDIUM text
Parity Browser - Origin Validation Error
Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).
by tintinweb
CVSS 5.3
EIP-2026-101048 EXPLOITDB text VERIFIED
Multiple CPUs - Information Leak Using Speculative Execution
by Google Security Research
EIP-2026-118379 EXPLOITDB ruby VERIFIED
Commvault Communications Service (cvd) - Command Injection (Metasploit)
by Metasploit
CVE-2017-8570 EXPLOITDB HIGH
Microsoft Office - Remote Code Execution
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.
by Rich Warren
CVSS 7.8
CVE-2018-0746 EXPLOITDB MEDIUM c++ VERIFIED
Microsoft Windows 10 - Information Disclosure
The Windows kernel in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0745 and CVE-2018-0747.
by Google Security Research
CVSS 4.7
CVE-2018-0745 EXPLOITDB MEDIUM c++ VERIFIED
Microsoft Windows 10 - Information Disclosure
The Windows kernel in Windows 10 version 1703. Windows 10 version 1709, and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0746 and CVE-2018-0747.
by Google Security Research
CVSS 4.7
CVE-2017-11893 EXPLOITDB HIGH javascript VERIFIED
ChakraCore and Microsoft Edge - Memory Corruption
ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
by Google Security Research
CVSS 7.5
CVE-2017-11918 EXPLOITDB HIGH javascript VERIFIED
ChakraCore and Microsoft Edge - Privilege Escalation
ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, and CVE-2017-11930.
by Google Security Research
CVSS 7.5
CVE-2017-11909 EXPLOITDB HIGH javascript VERIFIED
ChakraCore and Windows 10/Server - Memory Corruption
ChakraCore and Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
by Google Security Research
CVSS 7.5