Exploitdb Exploits

31,341 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-106527 EXPLOITDB text
Dolibarr Version 17.0.1 - Stored XSS
by Furkan Karaarslan
CVE-2023-37759 EXPLOITDB CRITICAL text
Trendylogics Crypto Currency Tracker < 9.5 - Improper Access Control
Incorrect access control in the User Registration page of Crypto Currency Tracker (CCT) before v9.5 allows unauthenticated attackers to register as an Admin account via a crafted POST request.
by 0xBr
CVSS 9.8
EIP-2026-106065 EXPLOITDB text VERIFIED
Color Prediction Game v1.0 - SQL Injection
by Ahmet Ümit BAYRAM
EIP-2026-101267 EXPLOITDB text
EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download
by LiquidWorm
EIP-2026-101266 EXPLOITDB text
EuroTel ETL3100 - Transmitter Default Credentials
by LiquidWorm
EIP-2026-101265 EXPLOITDB text
EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR)
by LiquidWorm
CVE-2022-47636 EXPLOITDB HIGH text
Outsystems Service Studio - Uncontrolled Search Path
A DLL hijacking vulnerability has been discovered in OutSystems Service Studio 11 11.53.30 build 61739. When a user open a .oml file (OutSystems Modeling Language), the application will load the following DLLs from the same directory av_libGLESv2.dll, libcef.DLL, user32.dll, and d3d10warp.dll. Using a crafted DLL, it is possible to execute arbitrary code in the context of the current logged in user.
by shinnai
CVSS 7.8
CVE-2023-53880 EXPLOITDB MEDIUM text
Lucee 5.4.2.17 - XSS
Lucee 5.4.2.17 contains a reflected cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through administrative interface parameters. Attackers can craft specific payloads targeting admin pages like server.cfm and web.cfm to execute arbitrary JavaScript in victim's browser sessions.
by Yehia Elghaly
CVE-2023-29689 EXPLOITDB CRITICAL text
Pyrocms - Remote Code Execution
PyroCMS 3.9 contains a remote code execution (RCE) vulnerability that can be exploited through a server-side template injection (SSTI) flaw. This vulnerability allows a malicious attacker to send customized commands to the server and execute arbitrary code on the affected system.
by Daniel Barros
CVSS 9.8
CVE-2023-4174 EXPLOITDB LOW text VERIFIED
Moosocial Moostore - XSS
A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. The identifier VDB-236209 was assigned to this vulnerability.
by CraCkEr
CVSS 3.5
EIP-2026-111098 EXPLOITDB text
PHPJabbers Vacation Rental Script 4.0 - CSRF
by Hasan Ali YILDIR
CVE-2023-4173 EXPLOITDB LOW text VERIFIED
Moosocial Moostore - XSS
A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-236208.
by CraCkEr
CVSS 3.5
CVE-2023-4168 EXPLOITDB MEDIUM text
Templatecookie Adlisting - Information Disclosure
A vulnerability was found in Templatecookie Adlisting 2.14.0. It has been classified as problematic. Affected is an unknown function of the file /ad-list of the component Redirect Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-236184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
by CraCkEr
CVSS 4.3
CVE-2023-54360 EXPLOITDB MEDIUM text
Joomla JLex Review 6.0.1 Reflected XSS via review_id Parameter
Joomla JLex Review 6.0.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the review_id URL parameter. Attackers can craft malicious links containing JavaScript payloads that execute in victims' browsers when clicked, enabling session hijacking or credential theft.
by CraCkEr
CVSS 6.1
CVE-2023-54359 EXPLOITDB HIGH text
WordPress adivaha Travel Plugin 2.3 SQL Injection via pid
WordPress adivaha Travel Plugin 2.3 contains a time-based blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'pid' GET parameter. Attackers can send requests to the /mobile-app/v3/ endpoint with crafted 'pid' values using XOR-based payloads to extract sensitive database information or cause denial of service.
by CraCkEr
CVSS 8.2
CVE-2023-54358 EXPLOITDB MEDIUM text
WordPress adivaha Travel Plugin 2.3 Reflected XSS via isMobile
WordPress adivaha Travel Plugin 2.3 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the isMobile parameter. Attackers can craft malicious URLs containing JavaScript payloads in the isMobile GET parameter at the /mobile-app/v3/ endpoint to execute arbitrary code in victims' browsers and steal session tokens or credentials.
by CraCkEr
CVSS 6.1
CVE-2025-71179 EXPLOITDB MEDIUM text
Creativeitem Academy Lms - XSS
Creativeitem Academy LMS 7.0 contains reflected Cross-Site Scripting (XSS) vulnerabilities via the search parameter to the /academy/blogs endpoint, and the string parameter to the /academy/course_bundles/search/query endpoint. These vulnerabilities are distinct from the patch for CVE-2023-4119, which only fixed XSS in query and sort_by parameters to the /academy/home/courses endpoint.
by CraCkEr
CVSS 6.1
CVE-2023-53885 EXPLOITDB HIGH text VERIFIED
Webutler v3.2 - RCE
Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
by Mirabbas Ağalarov
CVSS 7.2
CVE-2023-53884 EXPLOITDB MEDIUM text VERIFIED
Webedition CMS v2.9.8.8 - XSS
Webedition CMS v2.9.8.8 contains a stored cross-site scripting vulnerability that allows authenticated users to upload malicious SVG files with embedded JavaScript. Attackers can upload crafted SVG files through the media upload feature to inject and execute arbitrary scripts when the file is viewed by other users.
by Mirabbas Ağalarov
CVSS 5.4
CVE-2023-53883 EXPLOITDB HIGH text VERIFIED
Webedition CMS <2.9.8.8 - Authenticated RCE
Webedition CMS v2.9.8.8 contains a remote code execution vulnerability that allows authenticated attackers to inject system commands through PHP page creation. Attackers can create a new PHP page with malicious system commands in the description field to execute arbitrary commands on the server.
by Mirabbas Ağalarov
CVSS 7.2
CVE-2023-53882 EXPLOITDB MEDIUM text
JLex GuestBook 1.6.4 - XSS
JLex GuestBook 1.6.4 contains a reflected cross-site scripting vulnerability in the 'q' URL parameter that allows attackers to inject malicious scripts. Attackers can craft malicious links with XSS payloads to steal session tokens or execute arbitrary JavaScript in victims' browsers.
by CraCkEr
CVE-2023-7327 EXPLOITDB HIGH text
Ozeki SMS Gateway <=10.3.208 - Path Traversal
Ozeki SMS Gateway versions up to and including 10.3.208 contain a path traversal vulnerability. Successful exploitation allows an unauthenticated attacker to use URL-encoded traversal sequences to read arbitrary files from the underlying filesystem with the privileges of the gateway service, leading to disclosure of sensitive information.
by Ahmet Ümit BAYRAM
CVE-2023-4596 EXPLOITDB CRITICAL text
Forminator <1.24.6 - File Upload
The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
by Mehmet Kelepçe
CVSS 9.8
CVE-2023-3219 EXPLOITDB MEDIUM text
Eventon < 2.1.2 - IDOR
The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post.
by Miguel Santareno
CVSS 5.3
CVE-2023-2796 EXPLOITDB MEDIUM text
Eventon < 2.1.2 - Missing Authorization
The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.
by Miguel Santareno
CVSS 5.3