Exploitdb Exploits

31,344 exploits tracked across all sources.

Sort: Activity Stars
CVE-2010-3906 EXPLOITDB text VERIFIED
Git < 1.7.3.3 - XSS
Cross-site scripting (XSS) vulnerability in Gitweb 1.7.3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) f and (2) fp parameters.
by emgent
EIP-2026-105528 EXPLOITDB text VERIFIED
BlogCFC 5.9.6.001 - Multiple Cross-Site Scripting Vulnerabilities
by Richard Brain
CVE-2010-4259 EXPLOITDB text
Alexej Kryukov Fontforge - Memory Corruption
Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long CHARSET_REGISTRY header in a BDF font file.
by Ulrik Persson
EIP-2026-110776 EXPLOITDB text VERIFIED
PHP TopSites 2.1 - '/rate.php' Cross-Site Scripting / SQL Injection
by c0de Hunters
EIP-2026-108513 EXPLOITDB text VERIFIED
Joomla! Component com_redirect 1.5.19 - Local File Inclusion
by jos_ali_joe
EIP-2026-105245 EXPLOITDB text VERIFIED
Articlems 2.0 - 'c[]' Cross-Site Scripting
by Packetdeath
EIP-2026-100703 EXPLOITDB text VERIFIED
Mura CMS - Multiple Cross-Site Scripting Vulnerabilities
by Richard Brain
EIP-2026-109687 EXPLOITDB text VERIFIED
MyBB 1.4.10 - 'tags.php' Cross-Site Scripting
by TEAMELITE
CVE-2010-4507 EXPLOITDB text VERIFIED
Clear Ispot Firmware - CSRF
Multiple cross-site request forgery (CSRF) vulnerabilities on the iSpot 2.0.0.0 R1679, and the ClearSpot 2.0.0.0 R1512 and R1786, with firmware 1.9.9.4 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the cmd parameter in an act_cmd_result action to webmain.cgi, (2) enable remote management via an enable_remote_access act_network_set action to webmain.cgi, (3) enable the TELNET service via an ENABLE_TELNET act_set_wimax_etc_config action to webmain.cgi, (4) enable TELNET sessions via a certain act_network_set action to webmain.cgi, or (5) read arbitrary files via the FILE_PATH parameter in an act_file_download action to upgrademain.cgi.
by Trustwave's SpiderLabs
EIP-2026-105788 EXPLOITDB text VERIFIED
Cetera eCommerce - 'banner.php' Cross-Site Scripting
by MustLive
EIP-2026-112479 EXPLOITDB text VERIFIED
Sulata iSoft - 'stream.php' Local File Disclosure
by Sudden_death
EIP-2026-112300 EXPLOITDB text VERIFIED
Social Share - 'vote.php' HTTP Response Splitting
by Aliaksandr Hartsuyeu
EIP-2026-112213 EXPLOITDB text VERIFIED
slickMsg 0.7-alpha - 'top.php' Cross-Site Scripting
by Aliaksandr Hartsuyeu
EIP-2026-109310 EXPLOITDB text VERIFIED
ManageEngine EventLog Analyzer 6.1 - Multiple Cross-Site Scripting Vulnerabilities
by Rob Kraus
EIP-2026-108722 EXPLOITDB text VERIFIED
Joomla! Component JExtensions Property Finder - 'sf_id' SQL Injection
by FL0RiX
EIP-2026-108436 EXPLOITDB text VERIFIED
Joomla! Component com_mailto - Multiple Cross-Site Scripting Vulnerabilities
by MustLive
EIP-2026-108280 EXPLOITDB text
Joomla! Component com_billyportfolio 1.1.2 - Blind SQL Injection
by jdc
CVE-2010-4409 EXPLOITDB text
Php < 5.3.3 - Numeric Error
Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument.
by Maksymilian Arciemowicz
EIP-2026-100759 EXPLOITDB text VERIFIED
BizDir 05.10 - 'f_srch' Cross-Site Scripting
by Aliaksandr Hartsuyeu
EIP-2026-110764 EXPLOITDB text VERIFIED
PHP State - 'id' SQL Injection
by jos_ali_joe
EIP-2026-109862 EXPLOITDB text VERIFIED
net2ftp 0.98 (stable) - '/admin1.template.php' Local/Remote File Inclusion
by Marcin Ressel
EIP-2026-108720 EXPLOITDB text VERIFIED
Joomla! Component Jeformcr - 'id' SQL Injection
by FL0RiX
EIP-2026-108707 EXPLOITDB text
Joomla! Component JE Messenger 1.0 - Arbitrary File Upload
by Salvatore Fresta
CVE-2010-4517 EXPLOITDB text VERIFIED
Harmistechnology Com Jeauto - SQL Injection
SQL injection vulnerability in the JExtensions JE Auto (com_jeauto) component 1.0 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the char parameter in an item action to index.php.
by Salvatore Fresta
EIP-2026-106009 EXPLOITDB text
CMScout 2.09 - Cross-Site Request Forgery
by High-Tech Bridge SA