Exploitdb Exploits
31,344 exploits tracked across all sources.
Gallarific Php Photo Gallery Script - SQL Injection
SQL injection vulnerability in gallery.php in Gallarific PHP Photo Gallery script 2.1 and possibly other versions allows remote attackers to execute arbitrary SQL commands via the id parameter.
by AtT4CKxT3rR0r1ST
PHPB2B <4.1 - XSS
Cross-site scripting (XSS) vulnerability in list.php in PHPB2B 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the q parameter in a search action.
by H4ckCity Security Team
Apache Axis2 - Credentials Management
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
by rgod
httpdasm 0.92 - Path Traversal
A path traversal vulnerability exists in httpdasm version 0.92, a lightweight Windows HTTP server, that allows unauthenticated attackers to read arbitrary files on the host system. By sending a specially crafted GET request containing a sequence of URL-encoded backslashes and directory traversal patterns, an attacker can escape the web root and access sensitive files outside of the intended directory.
by John Leitch
QuickPHP Web Server 1.9.1 - Directory Traversal
by John Leitch
WordPress Core 3.0.3 - Persistent Cross-Site Scripting (Internet Explorer 6/7 / NS8.1)
by Saif
News Script PHP Pro - 'FCKeditor' Arbitrary File Upload
by Net.Edit0r
LoveCMS 1.6.2 - Cross-Site Request Forgery / Code Injection
by hiphop
LightNEasy 3.2.2 - Multiple Vulnerabilities
by High-Tech Bridge SA
Discovery TorrentTrader 2.6 - Multiple Vulnerabilities
by EsS4ndre
HotWeb Scripts HotWeb Rentals - 'PageId' SQL Injection
by non customers
Coppermine Photo Gallery <1.5.10 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in Coppermine Photo Gallery 1.5.10 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) h and (2) t parameters to help.php, or (3) picfile_XXX parameter to searchnew.php.
by waraxe
Web@all 1.1 - Remote Admin Settings Change
by Giuseppe D'Inverno
By Source