Bash Exploits

459 exploits tracked across all sources.

Sort: Newest Stars
CVE-2025-62360 EXPLOITDB HIGH bash
Wegia < 3.5.1 - SQL Injection
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users.Prior to 3.5.1, a SQL Injection vulnerability was identified in the /html/funcionario/dependente_documento.php endpoint, specifically in the id_dependente parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.5.1.
by onurdemir
CVSS 8.8
CVE-2025-34506 EXPLOITDB HIGH bash
Wbce Cms < 1.6.3 - Unrestricted File Upload
WBCE CMS version 1.6.3 and prior contains an authenticated remote code execution vulnerability that allows administrators to upload malicious modules. Attackers can craft a specially designed ZIP module with embedded PHP reverse shell code to gain remote system access when the module is installed.
by Swammers8
CVSS 8.8
CVE-2022-35914 EXPLOITDB CRITICAL bash
GLPI htmLawed php command injection
/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.
by Miguel Redondo
CVSS 9.8
EIP-2026-102817 EXPLOITDB bash
Dell Security Management Server <1.9.0 - Local Privilege Escalation
by Amirhossein Bahramizadeh
CVE-2023-37569 EXPLOITDB HIGH bash
Esds.co Emagic Data Center Management < 6.0 - OS Command Injection
This vulnerability exists in ESDS Emagic Data Center Management Suit due to lack of input sanitization in its Ping component. A remote authenticated attacker could exploit this by injecting OS commands on the targeted system. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code on targeted system.
by thewhiteh4t
CVSS 8.8
CVE-2023-37629 EXPLOITDB CRITICAL bash VERIFIED
Simple Online Piggery Management System - Unrestricted File Upload
Online Piggery Management System 1.0 is vulnerable to File Upload. An unauthenticated user can upload a php file by sending a POST request to "add-pig.php."
by 1337kid
CVSS 9.8
CVE-2023-53908 EXPLOITDB MEDIUM bash
HiSecOS 04.0.01 - Privilege Escalation
HiSecOS 04.0.01 contains a privilege escalation vulnerability that allows authenticated users to modify their access role through XML-based NETCONF configuration. Attackers can send crafted XML payloads to the /mops_data endpoint with a specific role value to elevate their user privileges to administrative level.
by dreizehnutters
CVSS 6.5
CVE-2023-30330 EXPLOITDB CRITICAL bash
Softexpert Excellence Suite < 2.1.3 - Untrusted Search Path
SoftExpert (SE) Excellence Suite 2.x versions before 2.1.3 is vulnerable to Local File Inclusion in the function /se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php.
by Felipe Alcantara
CVSS 9.8
CVE-2023-1671 EXPLOITDB CRITICAL bash
Sophos Web Appliance <4.3.10.4 - Command Injection
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
by Behnam Abasi Vanda
CVSS 9.8
CVE-2023-24709 EXPLOITDB HIGH bash
Paradox Security Systems IPR512 - DoS
An issue found in Paradox Security Systems IPR512 allows attackers to cause a denial of service via the login.html and login.xml parameters.
by Giorgi Dograshvili
CVSS 7.5
CVE-2023-22809 EXPLOITDB HIGH bash
Sudoedit Extra Arguments Priv Esc
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
by n3m1.sys
CVSS 7.8
EIP-2026-101159 EXPLOITDB bash
ASKEY RTF3505VW-N1 - Privilege Escalation
by Leonardo Nicolas Servalli
CVE-2022-40684 EXPLOITDB CRITICAL bash
Fortinet Fortiproxy < 7.0.7 - Authentication Bypass
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
by Felipe Alcantara
CVSS 9.8
EIP-2026-119275 EXPLOITDB bash
WiFiMouse 1.8.3.4 - Remote Code Execution (RCE)
by FEBIN MON SAJI
CVE-2021-45010 EXPLOITDB HIGH bash
Prasathmani Tiny File Manager < 2.4.7 - Path Traversal
A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution.
by FEBIN MON SAJI
CVSS 8.8
CVE-2022-0848 EXPLOITDB CRITICAL bash
Part-db < 0.5.11 - OS Command Injection
OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.
by Chetanya Sharma
CVSS 9.8
CVE-2022-50927 EXPLOITDB MEDIUM bash
Cyclades Serial Console Server 3.3.0 - Privilege Escalation
Cyclades Serial Console Server 3.3.0 contains a local privilege escalation vulnerability due to overly permissive sudo privileges for the admin user and admin group. Attackers can exploit the default user configuration to gain root access by manipulating system binaries and leveraging unrestricted sudo permissions.
by ibby
CVSS 6.2
EIP-2026-110277 EXPLOITDB bash
OpenCATS 0.9.4 - Remote Code Execution (RCE)
by Nicholas Ferreira
EIP-2026-114218 EXPLOITDB bash
Wordpress Plugin WP Guppy 1.1 - WP-JSON API Sensitive Information Disclosure
by Keyvan Hardani
CVE-2021-42013 EXPLOITDB CRITICAL bash
Apache HTTP Server < 9.2.6.0 - Path Traversal
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
by ThelastVvV
CVSS 9.8
CVE-2021-42013 EXPLOITDB CRITICAL bash VERIFIED
Apache HTTP Server < 9.2.6.0 - Path Traversal
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
by Lucas Souza
CVSS 9.8
CVE-2021-41773 EXPLOITDB CRITICAL bash VERIFIED
Apache 2.4.49/2.4.50 Traversal RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
by Lucas Souza
CVSS 9.8
CVE-2021-40875 EXPLOITDB HIGH bash
Gurock TestRail <7.2.0.3014 - Info Disclosure
Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.
by Sick Codes
CVSS 7.5
CVE-2021-29447 EXPLOITDB HIGH bash
Wordpress < 5.7.1 - XXE
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.
by David Utón
CVSS 7.1
CVE-2021-34621 EXPLOITDB CRITICAL bash
Properfraction Profilepress < 3.1.3 - Missing Authentication
A vulnerability in the user registration component found in the ~/src/Classes/RegistrationAuth.php file of the ProfilePress WordPress plugin made it possible for users to register on sites as an administrator. This issue affects versions 3.0.0 - 3.1.3. .
by Numan Rajkotiya
CVSS 9.8