Exploitdb Exploits

31,344 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-103780 EXPLOITDB text VERIFIED
Local Glibc Shared Library (.so) 2.11.1 - Code Execution
by Rh0
EIP-2026-100311 EXPLOITDB text VERIFIED
Espinas CMS - SQL Injection
by Pouya Daneshmand
EIP-2026-115592 EXPLOITDB text VERIFIED
McAfee Email Gateway < 6.7.2 Hotfix 2 - Multiple Vulnerabilities
by Nahuel Grisolia
EIP-2026-115496 EXPLOITDB text VERIFIED
Juke 4.0.2 - Denial of Service Multiple Files
by anonymous
EIP-2026-115280 EXPLOITDB text VERIFIED
Foxit Reader 3.2.1.0401 - Denial of Service
by juza
CVE-2010-1186 EXPLOITDB text VERIFIED
NextGEN Gallery < 1.5.2 - Cross-Site Scripting via mode Parameter
Cross-site scripting (XSS) vulnerability in xml/media-rss.php in the NextGEN Gallery plugin before 1.5.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the mode parameter.
by Alejandro Rodriguez
EIP-2026-112031 EXPLOITDB text VERIFIED
ShopSystem - SQL Injection
by Valentin
CVE-2010-5053 EXPLOITDB text VERIFIED
com_xobbix 1.0.1 - SQL Injection via prodid Parameter
SQL injection vulnerability in the XOBBIX (com_xobbix) component 1.0.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the prodid parameter in a prod_desc action to index.php.
by AntiSecurity
CVE-2010-1313 EXPLOITDB text VERIFIED
Seber Cart <1.0.0.12-1.0.0.13 - Path Traversal
Directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. NOTE: some of these details are obtained from third party information.
by AntiSecurity
CVE-2010-1312 EXPLOITDB text VERIFIED
iJoomla News Portal <1.5.x - Path Traversal
Directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
by AntiSecurity
CVE-2010-1352 EXPLOITDB text VERIFIED
JOOFORGE Jutebox <1.7 - Path Traversal
Directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
by AntiSecurity
CVE-2010-1980 EXPLOITDB text VERIFIED
Roberto Aloi Com Joomlaflickr - Path Traversal
Directory traversal vulnerability in joomlaflickr.php in the Joomla Flickr (com_joomlaflickr) component 1.0.3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
by AntiSecurity
CVE-2010-1977 EXPLOITDB text VERIFIED
Gohigheris Com Jwhmcs - Path Traversal
Directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
by AntiSecurity
CVE-2010-1314 EXPLOITDB text VERIFIED
Highslide JS <2.0.9 - Path Traversal
Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
by AntiSecurity
CVE-2010-1529 EXPLOITDB text VERIFIED
Freestyle FAQs Lite - SQL Injection via faqid Parameter
SQL injection vulnerability in the Freestyle FAQs Lite (com_fsf) component, possibly 1.3, for Joomla! allows remote attackers to execute arbitrary SQL commands via the faqid parameter in an faq action to index.php.
by Chip d3 bi0s
CVE-2010-1981 EXPLOITDB text VERIFIED
Fabrik 2.0 - Path Traversal via Controller Parameter
Directory traversal vulnerability in the Fabrik (com_fabrik) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
by AntiSecurity
EIP-2026-108207 EXPLOITDB text VERIFIED
Joomla! Component Appointment 1.5 - Local File Inclusion
by AntiSecurity
CVE-2010-1979 EXPLOITDB text VERIFIED
Affiliatefeeds Com Datafeeds - Path Traversal
Directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds) component build 880 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
by AntiSecurity
EIP-2026-102759 EXPLOITDB text
Virata EmWeb R6.0.1 - Remote Crash
by Jobert Abma
EIP-2026-101841 EXPLOITDB text
McAfee Email Gateway (formerly IronMail) - Cross-Site Scripting
by Nahuel Grisolia
EIP-2026-101040 EXPLOITDB text
McAfee Email Gateway (formerly IronMail) - Denial of Service
by Nahuel Grisolia
EIP-2026-100962 EXPLOITDB text
McAfee Email Gateway (formerly IronMail) - Local Privilege Escalation
by Nahuel Grisolia
EIP-2026-100961 EXPLOITDB text
McAfee Email Gateway (formerly IronMail) - Internal Information Disclosure
by Nahuel Grisolia
EIP-2026-109165 EXPLOITDB text
LionWiki 3.x - 'index.php' Arbitrary File Upload
by ayastar
CVE-2010-1308 EXPLOITDB text VERIFIED
Joomla! com_svmap 1.1.1 - Path Traversal
Directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
by Vrs-hCk