Exploitdb Exploits

49,996 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-14094 EXPLOITDB CRITICAL
Trend Micro Smart Protection Server <3.2 - Command Injection
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a cron job injection on a vulnerable system.
by CoreLabs
CVSS 9.8
CVE-2017-11907 EXPLOITDB HIGH html VERIFIED
Microsoft Windows - Memory Corruption
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
by Google Security Research
CVSS 7.5
CVE-2017-11906 EXPLOITDB MEDIUM html VERIFIED
Internet Explorer - Info Disclosure
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11887 and CVE-2017-11919.
by Google Security Research
CVSS 5.3
CVE-2017-11890 EXPLOITDB HIGH html VERIFIED
Microsoft Windows - Memory Corruption
Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
by Google Security Research
CVSS 7.5
CVE-2017-11903 EXPLOITDB HIGH html VERIFIED
Microsoft Windows - Memory Corruption
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
by Google Security Research
CVSS 7.5
CVE-2017-11855 EXPLOITDB HIGH html VERIFIED
Microsoft Windows - Privilege Escalation
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11856.
by Google Security Research
CVSS 7.5
CVE-2017-11793 EXPLOITDB HIGH html VERIFIED
Microsoft Windows - Memory Corruption
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11796, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
by Google Security Research
CVSS 7.5
CVE-2017-5717 EXPLOITDB HIGH text VERIFIED
Intel Graphics Driver - Privilege Escalation
Type Confusion in Content Protection HECI Service in Intel Graphics Driver allows unprivileged user to elevate privileges via local access.
by Google Security Research
CVSS 7.8
EIP-2026-108811 EXPLOITDB text VERIFIED
Joomla! Component NextGen Editor 2.1.0 - 'plname' SQL Injection
by Ihsan Sencan
CVE-2017-7411 EXPLOITDB HIGH ruby VERIFIED
Enalean Tuleap <9.6 - RCE
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
by Metasploit
CVSS 8.8
CVE-2017-14097 EXPLOITDB CRITICAL
Trend Micro Smart Protection Server <3.2 - Info Disclosure
An improper access control vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to decrypt contents of a database with information that could be used to access a vulnerable system.
by CoreLabs
CVSS 9.8
CVE-2016-0792 EXPLOITDB HIGH ruby VERIFIED
Jenkins XStream Groovy classpath Deserialization Vulnerability
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
by Metasploit
CVSS 8.8
CVE-2017-17739 EXPLOITDB CRITICAL text
Brightsign 4k242 Firmware < 6.2.63 - Path Traversal
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has directory traversal via the /storage.html rp parameter, allowing an attacker to read or write to files.
by Information Paradox
CVSS 9.8
CVE-2017-17761 EXPLOITDB CRITICAL
Ichano AtHome IP Camera - Command Injection
An issue was discovered on Ichano AtHome IP Camera devices. The device runs the "noodles" binary - a service on port 1300 that allows a remote (LAN) unauthenticated user to run arbitrary commands. This binary requires the "system" XML element for specifying the command. For example, a <system>id</system> command results in a <system_ack>ok</system_ack> response.
by SecuriTeam
CVSS 9.8
CVE-2017-18048 EXPLOITDB HIGH text VERIFIED
Monstra - Unrestricted File Upload
Monstra CMS 3.0.4 allows users to upload arbitrary files, which leads to remote command execution on the server, for example because .php (lowercase) is blocked but .PHP (uppercase) is not.
by Ishaq Mohammed
CVSS 8.8
EIP-2026-115025 EXPLOITDB python VERIFIED
CDex 1.96 - Buffer Overflow (PoC)
by bzyo
EIP-2026-108883 EXPLOITDB text
Joomla! Component User Bench 1.0 - 'userid' SQL Injection
by Ihsan Sencan
EIP-2026-108803 EXPLOITDB text
Joomla! Component My Projects 2.0 - SQL Injection
by Ihsan Sencan
EIP-2026-108688 EXPLOITDB text VERIFIED
Joomla! Component JB Visa 1.0 - 'visatype' SQL Injection
by Ihsan Sencan
EIP-2026-108668 EXPLOITDB text
Joomla! Component Guru Pro - 'promocode' SQL Injection
by Ihsan Sencan
EIP-2026-105861 EXPLOITDB text
Ciuis CRM 1.0.7 - SQL Injection
by Zahid Abbasi
EIP-2026-105770 EXPLOITDB text
Cells Blog 3.5 - 'bgid' / 'fmid' / 'fnid' SQL Injection
by Ihsan Sencan
CVE-2017-17560 EXPLOITDB CRITICAL ruby VERIFIED
Westerndigital MY Cloud Pr4100 Firmware - Authentication Bypass
An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device's file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root.
by Metasploit
CVSS 9.8
CVE-2017-17562 EXPLOITDB HIGH python VERIFIED
Embedthis GoAhead <3.6.5 - Remote Code Execution
Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.
by Daniel Hodson
CVSS 8.1
CVE-2017-15048 EXPLOITDB HIGH text VERIFIED
Zoom < 2.0.115900.1201 - Memory Corruption
Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.
by Conviso
CVSS 8.8