Exploitdb Exploits

31,344 exploits tracked across all sources.

Sort: Activity Stars
CVE-2010-1342 EXPLOITDB text VERIFIED
Direct News 4.10.2 - Remote Code Execution via PHP File Inclusion
Multiple PHP remote file inclusion vulnerabilities in Direct News 4.10.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the rootpath parameter to (1) admin/menu.php and (2) library/lib.menu.php; and the adminroot parameter to (3) admin/media/update_content.php and (4) library/class.backup.php. NOTE: some of these details are obtained from third party information.
by mat
EIP-2026-103954 EXPLOITDB text VERIFIED
Jenkins Software RakNet 3.72 - Remote Integer Underflow
by Luigi Auriemma
CVE-2010-0619 EXPLOITDB text VERIFIED
Lexmark x94x - Stack-based Buffer Overflow via PJL INQUIRE Command
Stack-based buffer overflow in the base, IPDS DLE, Forms DLE, Barcode DLE, Prescribe DLE, and Printcryption DLE components on certain Lexmark laser printers and multi-function printers allows remote attackers to execute arbitrary code or cause a denial of service (device hang) via a long argument to a PJL INQUIRE command.
by Francis Provencher
EIP-2026-113018 EXPLOITDB text VERIFIED
vBulletin Blog 4.0.2 - Title Cross-Site Scripting
by FormatXformat
EIP-2026-109902 EXPLOITDB text VERIFIED
New-CMS - Local File Inclusion
by Xash
EIP-2026-108590 EXPLOITDB text VERIFIED
Joomla! Component com_wallpapers - SQL Injection
by DevilZ TM
EIP-2026-108574 EXPLOITDB text VERIFIED
Joomla! Component com_universal - Remote File Inclusion
by eidelweiss
EIP-2026-108546 EXPLOITDB text VERIFIED
Joomla! Component com_software - SQL Injection
by DevilZ TM
CVE-2010-1340 EXPLOITDB text VERIFIED
J!Research (com_jresearch) - Path Traversal via Controller Parameter
Directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
by Chip d3 bi0s
EIP-2026-106706 EXPLOITDB text VERIFIED
Easy-Clanpage 2.0 - Blind SQL Injection
by Easy Laster
EIP-2026-106636 EXPLOITDB text VERIFIED
E-PHP CMS - SQL Injection
by Th3 RDX
EIP-2026-105963 EXPLOITDB text VERIFIED
CMS By SoftnSolv - 'index.php' SQL Injection
by Th3 RDX
CVE-2010-0167 EXPLOITDB text VERIFIED
Mozilla Firefox < 2.0.2 - Memory Corruption
The browser engine in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors related to (1) layout/generic/nsBlockFrame.cpp and (2) the _evaluate function in modules/plugin/base/src/nsNPAPIPlugin.cpp.
by Bob Clary
EIP-2026-119385 EXPLOITDB text VERIFIED
Joomla! Component com_gds - SQL Injection
by DevilZ TM
EIP-2026-114617 EXPLOITDB text VERIFIED
Zephyrus CMS - 'index.php' SQL Injection
by Phenom
EIP-2026-114408 EXPLOITDB text VERIFIED
Xataface - Admin Authentication Bypass
by Xinapse
EIP-2026-112861 EXPLOITDB text VERIFIED
Uiga Business Portal - 'index.php' SQL Injection
by Easy Laster
CVE-2009-2907 EXPLOITDB text VERIFIED
Springsource Application Management Suite < 2.0.0 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in SpringSource tc Server 6.0.20.B and earlier, Application Management Suite (AMS) before 2.0.0.SR4, Hyperic HQ Open Source before 4.2.x, Hyperic HQ 4.0 Enterprise before 4.0.3.2, and Hyperic HQ 4.1 Enterprise before 4.1.2.1 allow remote attackers to inject arbitrary web script or HTML via the description field and unspecified "input fields."
by Aaron Kulick
CVE-2010-1856 EXPLOITDB text VERIFIED
RepairShop2 1.9.023 Trial - Cross-Site Scripting via prod Parameter
Cross-site scripting (XSS) vulnerability in index.php in RepairShop2 1.9.023 Trial, when magic_quotes_gpc is disabled, allows remote attackers to inject arbitrary web script or HTML via the prod parameter in a products.details action.
by kaMtiEz
CVE-2010-1337 EXPLOITDB text VERIFIED
Lussumo Vanilla < 1.1.10 - Remote Code Execution via PHP File Inclusion
Multiple PHP remote file inclusion vulnerabilities in definitions.php in Lussumo Vanilla 1.1.10, and possibly 0.9.2 and other versions, allow remote attackers to execute arbitrary PHP code via a URL in the (1) include and (2) Configuration['LANGUAGE'] parameters.
by eidelweiss
EIP-2026-108973 EXPLOITDB text VERIFIED
Kasseler CMS News Module - 'id' SQL Injection
by Palyo34
CVE-2010-1858 EXPLOITDB text VERIFIED
Gelembjuk Com Smestorage < 1.0 - Path Traversal
Directory traversal vulnerability in the SMEStorage (com_smestorage) component before 1.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
by Chip d3 bi0s
CVE-2010-1875 EXPLOITDB text VERIFIED
Com-property Com Properties - Path Traversal
Directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
by Chip d3 bi0s
EIP-2026-108422 EXPLOITDB text
Joomla! Component com_jwmmxtd - Remote File Inclusion
by eidelweiss
EIP-2026-108302 EXPLOITDB text VERIFIED
Joomla! Component com_cb - 'cat' SQL Injection
by DevilZ TM