Exploitdb Exploits

31,357 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-107562 EXPLOITDB text VERIFIED
HB CMS 1.7 - SQL Injection
by Securitylab Security Research
EIP-2026-105615 EXPLOITDB text VERIFIED
BPStudent 1.0 - Blind SQL Injection
by OoN Boy
CVE-2009-3502 EXPLOITDB text VERIFIED
BPowerHouse BPMusic 1.0 - SQL Injection via music_id Parameter
SQL injection vulnerability in music.php in BPowerHouse BPMusic 1.0 allows remote attackers to execute arbitrary SQL commands via the music_id parameter.
by OoN Boy
CVE-2009-3705 EXPLOITDB text VERIFIED
Achievo < 1.4.0 - Remote Code Execution via Debugger Config Parameter
PHP remote file inclusion vulnerability in debugger.php in Achievo before 1.4.0 allows remote attackers to execute arbitrary PHP code via a URL in the config_atkroot parameter.
by M3NW5
CVE-2009-3487 EXPLOITDB text VERIFIED
Juniper JUNOS 8.5R1.14 - Authenticated Cross-Site Scripting via J-Web Interface Parameters
Multiple cross-site scripting (XSS) vulnerabilities in the J-Web interface in Juniper JUNOS 8.5R1.14 allow remote authenticated users to inject arbitrary web script or HTML via (1) the JEXEC_OUTID parameter in a JEXEC_MODE_RELAY_OUTPUT action to the jexec program; the (2) act, (3) refresh-time, or (4) ifid parameter to scripter.php; (5) the revision parameter in a rollback action to the configuration program; the m[] parameter to the (6) monitor, (7) manage, (8) events, (9) configuration, or (10) alarms program; (11) the m[] parameter to the default URI; (12) the m[] parameter in a browse action to the default URI; (13) the wizard-next parameter in an https action to the configuration program; or the (14) Contact Information, (15) System Description, (16) Local Engine ID, (17) System Location, or (18) System Name Override SNMP parameter, related to the configuration program.
by Amir Azam
CVE-2009-3486 EXPLOITDB text VERIFIED
Juniper JUNOS 8.5R1.14 - Authenticated Cross-Site Scripting via J-Web Interface Parameters
Multiple cross-site scripting (XSS) vulnerabilities in the J-Web interface in Juniper JUNOS 8.5R1.14 allow remote authenticated users to inject arbitrary web script or HTML via the host parameter to (1) the pinghost program, reachable through the diagnose program; or (2) the traceroute program, reachable through the diagnose program; or (3) the probe-limit parameter to the configuration program; the (4) wizard-ids or (5) pager-new-identifier parameter in a firewall-filters action to the configuration program; (6) the cos-physical-interface-name parameter in a cos-physical-interfaces-edit action to the configuration program; the (7) wizard-args or (8) wizard-ids parameter in an snmp action to the configuration program; the (9) username or (10) fullname parameter in a users action to the configuration program; or the (11) certname or (12) certbody parameter in a local-cert (aka https) action to the configuration program.
by Amir Azam
CVE-2009-3486 EXPLOITDB text VERIFIED
Juniper JUNOS 8.5R1.14 - Authenticated Cross-Site Scripting via J-Web Interface Parameters
Multiple cross-site scripting (XSS) vulnerabilities in the J-Web interface in Juniper JUNOS 8.5R1.14 allow remote authenticated users to inject arbitrary web script or HTML via the host parameter to (1) the pinghost program, reachable through the diagnose program; or (2) the traceroute program, reachable through the diagnose program; or (3) the probe-limit parameter to the configuration program; the (4) wizard-ids or (5) pager-new-identifier parameter in a firewall-filters action to the configuration program; (6) the cos-physical-interface-name parameter in a cos-physical-interfaces-edit action to the configuration program; the (7) wizard-args or (8) wizard-ids parameter in an snmp action to the configuration program; the (9) username or (10) fullname parameter in a users action to the configuration program; or the (11) certname or (12) certbody parameter in a local-cert (aka https) action to the configuration program.
by Amir Azam
CVE-2009-3487 EXPLOITDB text VERIFIED
Juniper JUNOS 8.5R1.14 - Authenticated Cross-Site Scripting via J-Web Interface Parameters
Multiple cross-site scripting (XSS) vulnerabilities in the J-Web interface in Juniper JUNOS 8.5R1.14 allow remote authenticated users to inject arbitrary web script or HTML via (1) the JEXEC_OUTID parameter in a JEXEC_MODE_RELAY_OUTPUT action to the jexec program; the (2) act, (3) refresh-time, or (4) ifid parameter to scripter.php; (5) the revision parameter in a rollback action to the configuration program; the m[] parameter to the (6) monitor, (7) manage, (8) events, (9) configuration, or (10) alarms program; (11) the m[] parameter to the default URI; (12) the m[] parameter in a browse action to the default URI; (13) the wizard-next parameter in an https action to the configuration program; or the (14) Contact Information, (15) System Description, (16) Local Engine ID, (17) System Location, or (18) System Name Override SNMP parameter, related to the configuration program.
by Amir Azam
CVE-2009-3485 EXPLOITDB text VERIFIED
Juniper JUNOS 8.5R1.14 and 9.0R1.1 - Cross-Site Scripting via PATH_INFO to J-Web Default URI
Cross-site scripting (XSS) vulnerability in the J-Web interface in Juniper JUNOS 8.5R1.14 and 9.0R1.1 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI.
by Amir Azam
CVE-2009-3436 EXPLOITDB text VERIFIED
MaxWebPortal - SQL Injection via FORUM_ID or CAT_ID Parameter
Multiple SQL injection vulnerabilities in forum.asp in MaxWebPortal allow remote attackers to execute arbitrary SQL commands via the (1) FORUM_ID or (2) CAT_ID parameter. NOTE: this might overlap CVE-2005-1417.
by OoN_Boy
CVE-2009-3499 EXPLOITDB text VERIFIED
BPowerHouse BPLawyerCaseDocuments 1.0 - SQL Injection via employee.aspx cat Parameter
SQL injection vulnerability in employee.aspx in BPowerHouse BPLawyerCaseDocuments 1.0 allows remote attackers to execute arbitrary SQL commands via the cat parameter.
by OoN Boy
CVE-2009-3503 EXPLOITDB text VERIFIED
BPHolidayLettings 1.0 - SQL Injection via search.aspx rid or tid Parameter
Multiple SQL injection vulnerabilities in search.aspx in BPowerHouse BPHolidayLettings 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) rid and (2) tid parameters.
by OoN Boy
CVE-2009-3327 EXPLOITDB text VERIFIED
WX-Guestbook 1.1.208 - SQL Injection via QUERY or USERNAME Parameter
Multiple SQL injection vulnerabilities in WX-Guestbook 1.1.208 allow remote attackers to execute arbitrary SQL commands via the (1) QUERY parameter to search.php and (2) USERNAME parameter to login.php. NOTE: some of these details are obtained from third party information.
by learn3r
EIP-2026-114396 EXPLOITDB text VERIFIED
WX-Guestbook 1.1.208 - SQL Injection / HTML Injection
by learn3r
CVE-2009-3328 EXPLOITDB text VERIFIED
WX-Guestbook 1.1.208 - Cross-Site Scripting via sName Parameter
Cross-site scripting (XSS) vulnerability in sign.php in WX-Guestbook 1.1.208 allows remote attackers to inject arbitrary web script or HTML via the sName parameter (aka the name field). NOTE: some of these details are obtained from third party information.
by learn3r
CVE-2009-3324 EXPLOITDB text VERIFIED
ProdLer < 2.0 - Remote Code Execution via sPath Parameter
PHP remote file inclusion vulnerability in include/prodler.class.php in ProdLer 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the sPath parameter.
by cr4wl3r
CVE-2009-3492 EXPLOITDB text VERIFIED
Loggix Project <= 9.4.5 - Remote Code Execution via pathToIndex Parameter
Multiple PHP remote file inclusion vulnerabilities in Loggix Project 9.4.5 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the pathToIndex parameter to (1) Calendar.php, (2) Comment.php, (3) Rss.php and (4) Trackback.php in lib/Loggix/Module/; and (5) modules/downloads/lib/LM_Downloads.php.
by cr4wl3r
CVE-2009-3325 EXPLOITDB text VERIFIED
Focusdev Com Surveymanager - SQL Injection
SQL injection vulnerability in the Focusplus Developments Survey Manager (com_surveymanager) component 1.5.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the stype parameter in an editsurvey action to index.php.
by kaMtiEz
CVE-2009-3334 EXPLOITDB text VERIFIED
Lhacky! Extensions Cave Joomla! Integrated Newsletters Component 0.2 - SQL Injection via newsid Parameter
SQL injection vulnerability in the Lhacky! Extensions Cave Joomla! Integrated Newsletters Component (aka JINC or com_jinc) component 0.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the newsid parameter in a messages action to index.php.
by Chip d3 bi0s
CVE-2009-3332 EXPLOITDB text VERIFIED
JBudgetsMagic 0.3.2-0.4.0 - SQL Injection via bid Parameter
SQL injection vulnerability in the JBudgetsMagic (com_jbudgetsmagic) component 0.3.2 through 0.4.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the bid parameter in a mybudget action to index.php.
by kaMtiEz
CVE-2009-3331 EXPLOITDB text VERIFIED
DDL CMS 1.0 - Remote Code Execution via wwwRoot Parameter
Multiple PHP remote file inclusion vulnerabilities in DDL CMS 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the wwwRoot parameter to (1) header.php, (2) submit.php, (3) submitted.php, and (4) autosubmitter/index.php.
by HxH
CVE-2009-3326 EXPLOITDB text VERIFIED
CMScontrol 7.x - SQL Injection via id_menu Parameter
SQL injection vulnerability in index.php in CMScontrol Content Management System 7.x allows remote attackers to execute arbitrary SQL commands via the id_menu parameter.
by ph1l1ster
CVE-2009-3323 EXPLOITDB text VERIFIED
BAROSmini 0.32.595 - Remote Code Execution via PHP File Inclusion
Multiple PHP remote file inclusion vulnerabilities in BAnner ROtation System mini (BAROSmini) 0.32.595 allow remote attackers to execute arbitrary PHP code via a URL in the baros_path parameter to (1) include/common_functions.php, and the main_path parameter to (2) lib_users.php, (3) lib_stats.php, and (4) lib_slots.php in include/lib/.
by EA Ngel
EIP-2026-103656 EXPLOITDB text VERIFIED
Snort unified 1 IDS Logging - Alert Evasion & Logfile Corruption/Alert Falsify
by Pablo Rincón Crespo
CVE-2009-4637 EXPLOITDB text VERIFIED
FFmpeg 0.5 - Stack-based Buffer Overflow
FFmpeg 0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a stack-based buffer overflow.
by Will Dormann