Exploitdb Exploits

49,996 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-11911 EXPLOITDB HIGH javascript VERIFIED
ChakraCore & Windows - Memory Corruption
ChakraCore and Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
by Google Security Research
CVSS 7.5
CVE-2017-16886 EXPLOITDB HIGH python
FiberHome Mobile WIFI Device - CSRF
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services via CSRF can result in an unauthorized change of username or password of the administrator of the portal.
by Ibad Shah
CVSS 8.8
CVE-2017-16885 EXPLOITDB CRITICAL python
FiberHome LM53Q1 VH519R05C01S38 - Info Disclosure
Improper Permissions Handling in the Portal on FiberHome LM53Q1 VH519R05C01S38 devices (intended for obtaining information about Internet Usage, Changing Passwords, etc.) allows remote attackers to look for the information without authenticating. The information includes Version of device, Firmware ID, Connected users to device along their MAC Addresses, etc.
by Ibad Shah
CVSS 9.8
EIP-2026-117533 EXPLOITDB text VERIFIED
Microsoft Windows - Local XPS Print Spooler Sandbox Escape
by Google Security Research
CVE-2017-15662 EXPLOITDB HIGH python VERIFIED
Flexense VX Search - Denial of Service
In Flexense VX Search Enterprise v10.1.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9123.
by Ahmad Mahfouz
CVSS 7.5
CVE-2017-15664 EXPLOITDB HIGH python
Flexense Syncbreeze - Denial of Service
In Flexense Sync Breeze Enterprise v10.1.16, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9121.
by Ahmad Mahfouz
CVSS 7.5
CVE-2017-15665 EXPLOITDB HIGH python
Flexense Diskboss - Denial of Service
In Flexense DiskBoss Enterprise 8.5.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 8094.
by Ahmad Mahfouz
CVSS 7.5
CVE-2017-15663 EXPLOITDB HIGH python
Flexense Disk Pulse - Denial of Service
In Flexense Disk Pulse Enterprise v10.1.18, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9120.
by Ahmad Mahfouz
CVSS 7.5
EIP-2026-114978 EXPLOITDB text
BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow (PoC)
by hyp3rlinx
EIP-2026-113863 EXPLOITDB text
WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload
by NinTechNet
CVE-2017-1000432 EXPLOITDB HIGH html VERIFIED
Vanilla Forums <2.1.5 - CSRF
Vanilla Forums below 2.1.5 are affected by CSRF leading to Deleting topics and comments from forums Admin access
by Anand Meyyappan
CVSS 8.0
EIP-2026-112533 EXPLOITDB text
Synology Photostation < 6.7.2-3429 - Multiple Vulnerabilities
by GulfTech Security
EIP-2026-102280 EXPLOITDB text
Photos in Wifi 1.0.1 - Path Traversal
by Vulnerability-Lab
EIP-2026-102017 EXPLOITDB text
SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities
by Vulnerability-Lab
CVE-2017-16887 EXPLOITDB CRITICAL python
FiberHome Mobile WIFI Device - Info Disclosure
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services can result in disclosure of the WLAN key/password.
by Ibad Shah
CVSS 9.8
CVE-2017-9554 EXPLOITDB MEDIUM text
Synology DSM <6.1.3-15152 - Info Disclosure
An information exposure vulnerability in forget_passwd.cgi in Synology DiskStation Manager (DSM) before 6.1.3-15152 allows remote attackers to enumerate valid usernames via unspecified vectors.
by Steve Kaun
CVSS 5.3
CVE-2017-13216 EXPLOITDB HIGH text VERIFIED
Google Android - Out-of-Bounds Write
In ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-66954097.
by Google Security Research
CVSS 7.8
CVE-2017-17097 EXPLOITDB CRITICAL text
GPS Tracking Software 2.x - Info Disclosure
gps-server.net GPS Tracking Software (self hosted) 2.x has a password reset procedure that immediately resets passwords upon an unauthenticated request, and then sends e-mail with a predictable (date-based) password to the admin, which makes it easier for remote attackers to obtain access by predicting this new password. This is related to the use of gmdate for password creation in fn_connect.php.
by Noman Riffat
CVSS 9.8
CVE-2017-15222 EXPLOITDB CRITICAL ruby VERIFIED
Nftp < 2.0 - Buffer Overflow
Buffer Overflow vulnerability in Ayukov NFTPD 2.0 and earlier allows remote attackers to execute arbitrary code.
by Metasploit
CVSS 9.8
CVE-2018-0744 EXPLOITDB HIGH text VERIFIED
Windows - Privilege Escalation
The Windows kernel in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Elevation of Privilege Vulnerability".
by Google Security Research
CVSS 7.0
EIP-2026-115325 EXPLOITDB python
GetGo Download Manager 5.3.0.2712 - 'Proxy' Buffer Overflow
by devcoinfet
CVE-2017-17098 EXPLOITDB CRITICAL text
GPS Tracking Software <3.0 - Code Injection
The writeLog function in fn_common.php in gps-server.net GPS Tracking Software (self hosted) through 3.0 allows remote attackers to inject arbitrary PHP code via a crafted request that is mishandled during admin log viewing, as demonstrated by <?php system($_GET[cmd]); ?> in a login request.
by Noman Riffat
CVSS 9.8
EIP-2026-103034 EXPLOITDB ruby VERIFIED
VMware Workstation - ALSA Config File Local Privilege Escalation (Metasploit)
by Metasploit
CVE-2017-7997 EXPLOITDB CRITICAL text
Gespage < 7.4.9 - SQL Injection
Multiple SQL injection vulnerabilities in Gespage before 7.4.9 allow remote attackers to execute arbitrary SQL commands via the (1) show_prn parameter to webapp/users/prnow.jsp or show_month parameter to (2) webapp/users/blhistory.jsp or (3) webapp/users/prhistory.jsp.
by Sysdream
CVSS 9.8
CVE-2017-6736 EXPLOITDB HIGH python
Cisco IOS - RCE
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. There are workarounds that address these vulnerabilities.
by Artem Kondratenko
CVSS 8.8