Exploitdb Exploits

31,339 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-113233 EXPLOITDB text VERIFIED
web@all - 'name' Cross-Site Scripting
by Sammy FORGIT
EIP-2026-112952 EXPLOITDB text
VamCart CMS 0.9 - Multiple Vulnerabilities
by Vulnerability-Lab
EIP-2026-112105 EXPLOITDB text VERIFIED
Simple Machines 2.0.2 - Multiple HTML Injection Vulnerabilities
by Benjamin Kunz Mejri
EIP-2026-111670 EXPLOITDB text VERIFIED
Rama Zeiten CMS - 'download.php' Remote File Disclosure
by Sammy FORGIT
EIP-2026-110512 EXPLOITDB text
PBBoard CMS 2.1.4 - Multiple Vulnerabilities
by Vulnerability-Lab
EIP-2026-106932 EXPLOITDB text VERIFIED
Event Calender PHP - Multiple Input Validation Vulnerabilities
by snup
EIP-2026-106851 EXPLOITDB text VERIFIED
EmbryoCore CMS 1.03 - 'loadcss.php' Multiple Directory Traversal Vulnerabilities
by Sammy FORGIT
CVE-2012-4399 EXPLOITDB HIGH text VERIFIED
Cakefoundation Cakephp < 2.1.5 - XXE
The Xml class in CakePHP 2.1.x before 2.1.5 and 2.2.x before 2.2.1 allows remote attackers to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.
by Pawel Wylecial
CVSS 7.5
EIP-2026-102104 EXPLOITDB text VERIFIED
Vivotek Cameras - Sensitive Information Disclosure
by GothicX
EIP-2026-106833 EXPLOITDB text VERIFIED
Elite Bulletin Board - Multiple SQL Injections
by ToXiC
EIP-2026-108466 EXPLOITDB text
Joomla! Component com_osproperty 2.0.2 - Unrestricted Arbitrary File Upload
by D4NB4R
CVE-2012-10049 EXPLOITDB CRITICAL text VERIFIED
WebPageTest <2.6 - RCE
WebPageTest version 2.6 and earlier contains an arbitrary file upload vulnerability in the resultimage.php script. The application fails to validate or sanitize user-supplied input before saving uploaded files to a publicly accessible directory. This flaw allows remote attackers to upload and execute arbitrary PHP code, resulting in full remote code execution under the web server context.
by dun
EIP-2026-114009 EXPLOITDB text
WordPress Plugin Resume Submissions & Job Postings 2.5.1 - Unrestricted Arbitrary File Upload
by Chris Kellum
EIP-2026-109240 EXPLOITDB text VERIFIED
Magento eCommerce - Local File Disclosure
by SEC Consult
EIP-2026-108426 EXPLOITDB text
Joomla! Component com_ksadvertiser - Remote File / Bypass Upload
by D4NB4R
CVE-2012-1858 EXPLOITDB text VERIFIED
Microsoft Lync - Information Disclosure
The toStaticHTML API (aka the SafeHTML component) in Microsoft Internet Explorer 8 and 9, Communicator 2007 R2, and Lync 2010 and 2010 Attendee does not properly handle event attributes and script, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document, aka "HTML Sanitization Vulnerability."
by Adi Cohen
CVE-2010-4980 EXPLOITDB text
iScripts ReserveLogic 1.0 - SQL Injection
SQL injection vulnerability in packagedetails.php in iScripts ReserveLogic 1.0 allows remote attackers to execute arbitrary SQL commands via the pid parameter.
by Vulnerability-Lab
EIP-2026-110594 EXPLOITDB text VERIFIED
Phonalisa - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities
by Benjamin Kunz Mejri
EIP-2026-109082 EXPLOITDB text VERIFIED
Lc Flickr Carousel 1.0 - Local File Disclosure
by GoLd_M
EIP-2026-107659 EXPLOITDB text VERIFIED
House Style 0.1.2 - 'readfile()' Local File Disclosure
by GoLd_M
EIP-2026-106748 EXPLOITDB text VERIFIED
eCan 0.1 - Local File Disclosure
by GoLd_M
EIP-2026-102059 EXPLOITDB text
TP-Link Gateway 3.12.4 - Multiple Vulnerabilities
by Vulnerability-Lab
CVE-2012-3805 EXPLOITDB text VERIFIED
Kajona < 3.4.1 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in the getAllPassedParams function in system/functions.php in Kajona before 3.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) absender_name, (2) absender_email, or (3) absender_nachricht parameter to the content page; (4) comment_name, (5) comment_subject, or (6) comment_message parameter to the postacomment module; (7) module parameter to index.php; (8) action parameter to the admin login page; (9) pv or (10) pe parameter in a list action to the user module; (11) user_username, (12) user_email, (13) user_forename, (14) user_name, (15) user_street, (16) user_postal, (17) user_city, (18) user_tel, or (19) user_mobil parameter in a newUser action to the user module; (20) group_name or (21) group_desc parameter in a groupNew action to the user module; (22) name, (23) browsername, (24) seostring, (25) keywords, or (26) folder_id parameter in a newPage action to the pages module; (27) element_name or (28) element_cachetime parameter in a newElement action in the pages module; (29) aspect_name parameter in a newAspect action in the system module; (30) filemanager_name, (31) filemanager_path, (32) filemanager_upload_filter, or (33) filemanager_view_filter parameter in a NewRepo action to the filemanager module; or (34) archive_title or (35) archive_path parameter in a newArchive action to the downloads module. NOTE: some of these details are obtained from third party information.
by High-Tech Bridge SA
EIP-2026-115045 EXPLOITDB text
Checkpoint Abra - Multiple Vulnerabilities
by Andrey Komarov
EIP-2026-114261 EXPLOITDB text VERIFIED
WordPress Plugin WP-Predict 1.0 - Blind SQL Injection
by Chris Kellum