Exploitdb Exploits

31,346 exploits tracked across all sources.

Sort: Activity Stars
CVE-2021-34249 EXPLOITDB HIGH text
Online Book Store - SQL Injection
SQL injection vulnerability in sourcecodester online-book-store 1.0 allows remote attackers to view sensitive information via the id paremeter in application URL.
by Moaaz Taha
CVSS 7.5
CVE-2020-24791 EXPLOITDB CRITICAL text
Thedaylightstudio Fuel Cms - SQL Injection
FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
by c0mpu7er
CVSS 9.8
CVE-2020-24223 EXPLOITDB MEDIUM text
Mara CMS 7.5 - XSS
Mara CMS 7.5 allows cross-site scripting (XSS) in contact.php via the theme or pagetheme parameters.
by George Tsimpidas
CVSS 6.1
CVE-2020-25362 EXPLOITDB HIGH text
Online Shopping Alphaware - SQL Injection
The id paramater in Online Shopping Alphaware 1.0 has been discovered to be vulnerable to an Error-Based blind SQL injection in the /alphaware/details.php path. This allows an attacker to retrieve all databases.
by Moaaz Taha
CVSS 7.5
CVE-2020-25343 EXPLOITDB MEDIUM text
Symphony - XSS
Cross-site scripting (XSS) vulnerabilities in Symphony CMS 3.0.0 allow remote attackers to inject arbitrary web script or HTML to fields['body'] param via events\event.publish_article.php
by SunCSR
CVSS 5.4
EIP-2026-104347 EXPLOITDB text
Nagios Log Server 2.1.6 - Persistent Cross-Site Scripting
by Jinson Varghese Behanan
EIP-2026-113577 EXPLOITDB text
Wordpress Plugin Autoptimize 2.7.6 - Arbitrary File Upload (Authenticated)
by SunCSR Team
CVE-2020-36893 EXPLOITDB HIGH text
Eibiz i-Media Server Digital Signage 3.8.0 - Path Traversal
Eibiz i-Media Server Digital Signage 3.8.0 contains a directory traversal vulnerability that allows unauthenticated remote attackers to access files outside the server's root directory. Attackers can exploit the 'oldfile' GET parameter to view sensitive configuration files like web.xml and system files such as win.ini.
by LiquidWorm
CVSS 7.5
EIP-2026-104241 EXPLOITDB text
Ericom Access Server x64 9.2.0 - Server-Side Request Forgery
by hyp3rlinx
CVE-2020-36993 EXPLOITDB MEDIUM text
LimeSurvey 4.3.10 - XSS
LimeSurvey 4.3.10 contains a stored cross-site scripting vulnerability in the Survey Menu functionality of the administration panel. Attackers can inject malicious SVG scripts through the Surveymenu[title] and Surveymenu[parent_id] parameters to execute arbitrary JavaScript in administrative contexts.
by Matthew Aberegg
CVSS 5.4
CVE-2020-36895 EXPLOITDB HIGH text
EIBIZ i-Media Server Digital Signage 3.8.0 - Info Disclosure
EIBIZ i-Media Server Digital Signage 3.8.0 contains an unauthenticated configuration disclosure vulnerability that allows remote attackers to access sensitive configuration files via direct object reference. Attackers can retrieve the SiteConfig.properties file through an HTTP GET request, exposing administrative credentials, database connection details, and system configuration information.
by LiquidWorm
CVSS 7.5
CVE-2020-36894 EXPLOITDB HIGH text
Eibiz i-Media Server Digital Signage 3.8.0 - Auth Bypass
Eibiz i-Media Server Digital Signage 3.8.0 contains an authentication bypass vulnerability that allows unauthenticated attackers to create admin users through AMF-encoded object manipulation. Attackers can send crafted serialized objects to the /messagebroker/amf endpoint to create administrative users without authentication, bypassing security controls.
by LiquidWorm
CVSS 7.5
CVE-2020-24932 EXPLOITDB CRITICAL text
Sourcecodester Complaint Management System - SQL Injection
An SQL Injection vulnerability exists in Sourcecodester Complaint Management System 1.0 via the cid parameter in complaint-details.php.
by Mohamed Elobeid
CVSS 9.8
EIP-2026-101989 EXPLOITDB text
Seowon SlC 130 Router - Remote Code Execution
by maj0rmil4d
CVE-2020-24841 EXPLOITDB CRITICAL text
SDG Pnpscada - SQL Injection
PNPSCADA 2.200816204020 allows SQL injection via parameter 'interf' in /browse.jsp. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
by İsmail ERKEK
CVSS 9.8
CVE-2020-35249 EXPLOITDB MEDIUM text
Elkarbackup - XSS
Cross Site Scripting (XSS) vulnerability in ElkarBackup 1.3.3, allows attackers to execute arbitrary code via the name parameter to the add client feature.
by Enes Özeser
CVSS 6.1
CVE-2020-37015 EXPLOITDB HIGH text
Ruijie Networks Switch eWeb S29_RGOS 11.4 - Path Traversal
Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. Attackers can exploit the /download.do endpoint with '../' sequences to retrieve system configuration files containing credentials and network settings.
by Tuygun
CVSS 7.5
CVE-2020-24862 EXPLOITDB HIGH text
Pharmacy Medical Store And Sale Point - SQL Injection
The catID parameter in Pharmacy Medical Store and Sale Point v1.0 has been found to be vulnerable to a Time-Based blind SQL injection via the /medical/inventories.php path which allows attackers to retrieve all databases.
by Moaaz Taha
CVSS 7.5
CVE-2020-24609 EXPLOITDB MEDIUM text
Savsoft Quiz <5.5 - XSS
TechKshetra Info Solutions Pvt. Ltd Savsoft Quiz 5.5 and earlier has XSS which can result in an attacker injecting the XSS payload in the User Registration section and each time the admin visits the manage user section from the admin panel, the XSS triggers and the attacker can steal the cookie via crafted payload.
by Mayur Parmar
CVSS 6.1
CVE-2020-36899 EXPLOITDB HIGH text
QiHang Media Web Digital Signage 3.0.9 - Info Disclosure
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file disclosure vulnerability that allows remote attackers to access sensitive files through unverified 'filename' and 'path' parameters. Attackers can exploit the QH.aspx endpoint to read arbitrary files and directory contents without authentication by manipulating download and getAll actions.
by LiquidWorm
CVSS 7.5
CVE-2020-36898 EXPLOITDB CRITICAL text
QiHang Media Web Digital Signage 3.0.9 - Path Traversal
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file deletion vulnerability in the QH.aspx endpoint that allows remote attackers to delete files without authentication. Attackers can exploit the 'data' parameter by sending a POST request with file paths to delete arbitrary files with web server permissions using directory traversal sequences.
by LiquidWorm
CVSS 9.1
CVE-2020-36897 EXPLOITDB CRITICAL text
QiHang Media Web Digital Signage 3.0.9 - RCE
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit the file upload functionality by using the 'remotePath' and 'fileToUpload' parameters to write and execute arbitrary system commands on the server.
by LiquidWorm
CVSS 9.8
CVE-2020-36896 EXPLOITDB HIGH text
QiHang Media Web Digital Signage 3.0.9 - Auth Bypass
QiHang Media Web Digital Signage 3.0.9 contains a cleartext credentials vulnerability that allows unauthenticated attackers to access administrative login information through an unprotected XML file. Attackers can retrieve hardcoded admin credentials by requesting the '/xml/User/User.xml' file, enabling direct authentication bypass.
by LiquidWorm
CVSS 7.5
CVE-2020-23837 EXPLOITDB HIGH text
GetSimple CMS Multi User 1.8.2 - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability in the Multi User plugin 1.8.2 for GetSimple CMS allows remote attackers to add admin (or other) users after an authenticated admin visits a third-party site or clicks on a URL.
by boku
CVSS 8.8
CVE-2020-17462 EXPLOITDB HIGH text
CMS Made Simple <2.2.14 - Auth Bypass
CMS Made Simple 2.2.14 allows Authenticated Arbitrary File Upload because the File Manager does not block .ptar files, a related issue to CVE-2017-16798.
by Roel van Beurden
CVSS 7.8