Exploitdb Exploits
31,344 exploits tracked across all sources.
Joomla! Component com_jfuploader < 2.12 - Arbitrary File Upload
by Setr0nix
CMS WebManager-Pro 7.4.3 - Cross-Site Scripting / SQL Injection
by MustLive
Home FTP Server 1.11.1.149 - (Authenticated) Directory Traversal
by chr1x
Feindura CMS Groupware - Multiple Local File Inclusion / Cross-Site Scripting Vulnerabilities
by Justanotherhacker.com
MinaliC WebServer 1.0 - Remote Source Disclosure / File Download
by Dr_IDE
Zomplog 3.9 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities
by High-Tech Bridge SA
Zomplog 3.9 - Cross-Site Request Forgery
by High-Tech Bridge SA
W-Agora 4.1.5 - Local File Inclusion / Cross-Site Scripting
by MustLive
phpLiterAdmin 1.0 RC1 - Authentication Bypass
by High-Tech Bridge SA
Novaboard 1.1.4 - Local File Inclusion
by High-Tech Bridge SA
NinkoBB 1.3 RC5 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in users.php in NinkoBB 1.3 RC5 allow remote attackers to inject arbitrary web script or HTML via the (1) first_name, (2) last_name, (3) msn, or (4) aim parameter.
by High-Tech Bridge SA
Energine < 2.3.8 - SQL Injection
SQL injection vulnerability in index.php in Energine, possibly 2.3.8 and earlier, allows remote attackers to execute arbitrary SQL commands via the NRGNSID cookie.
by High-Tech Bridge SA
DZCP (deV!L_z Clanportal) 1.5.4 - Local File Inclusion
by High-Tech Bridge SA
DBHcms 1.1.4 - 'dbhcms_user/SearchString' SQL Injection
by High-Tech Bridge SA
BloofoxCMS 0.3.5 - SQL Injection
SQL injection vulnerability in index.php in BloofoxCMS 0.3.5 allows remote attackers to execute arbitrary SQL commands via the gender parameter.
by High-Tech Bridge SA
BloofoxCMS 0.3.5 - Information Disclosure
by High-Tech Bridge SA
BlogBird Platform - Multiple Cross-Site Scripting Vulnerabilities
by High-Tech Bridge SA
AlstraSoft Web Email Script Enterprise - SQL Injection
SQL injection vulnerability in index.php in AlstraSoft Web Email Script Enterprise (ESE) allows remote attackers to execute arbitrary SQL commands via the id parameter in a directory action.
by Salvatore Fresta
By Source