Exploitdb Exploits

50,130 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-54338 EXPLOITDB HIGH text
Tftpd32 SE 4.60 - Code Injection
Tftpd32 SE 4.60 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will be run with system-level permissions.
by Ismael Nava
CVSS 8.4
CVE-2023-54337 EXPLOITDB CRITICAL text
Sysax Multi Server - Denial of Service
Sysax Multi Server 6.95 contains a denial of service vulnerability in the administrative password field that allows attackers to crash the application. Attackers can overwrite the password field with 800 bytes of repeated characters to trigger an application crash and disrupt server functionality.
by Luis Martínez
CVSS 9.1
CVE-2023-54336 EXPLOITDB HIGH text
Mediconta 3.7.27 - Privilege Escalation
Mediconta 3.7.27 contains an unquoted service path vulnerability in the servermedicontservice that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\medicont3\ to inject malicious code that would execute with LocalSystem permissions during service startup.
by Luis Martínez
CVSS 8.4
CVE-2023-54335 EXPLOITDB CRITICAL text
Extplorer < 2.1.14 - Missing Authentication
eXtplorer 2.1.14 contains an authentication bypass vulnerability that allows attackers to login without a password by manipulating the login request. Attackers can exploit this flaw to upload malicious PHP files and execute remote commands on the vulnerable file management system.
by ErPaciocco
CVSS 9.8
CVE-2023-54334 EXPLOITDB CRITICAL text
Explorerplusplus Explorer++ - Out-of-Bounds Write
Explorer32++ 1.3.5.531 contains a buffer overflow vulnerability in Structured Exception Handler (SEH) records that allows attackers to execute arbitrary code. Attackers can exploit the vulnerability by providing a long file name argument over 396 characters to corrupt the SEH chain and potentially execute malicious code.
by Rafael Pedrero
CVSS 9.8
EIP-2026-119274 EXPLOITDB python
WiFi Mouse 1.8.3.2 - Remote Code Execution (RCE)
by Payal
EIP-2026-117853 EXPLOITDB text
Resource Hacker v3.6.0.92 - Buffer overflow
by Rafael Pedrero
EIP-2026-117237 EXPLOITDB text
Gestionale Open 12.00.00 - 'DB_GO_80' Unquoted Service Path
by Luis Martínez
EIP-2026-117205 EXPLOITDB text
Frhed (Free hex editor) v1.6.0 - Buffer overflow
by Rafael Pedrero
EIP-2026-116864 EXPLOITDB python
AVS Audio Converter 10.3 - Stack Overflow (SEH)
by Yehia Elghaly
EIP-2026-116223 EXPLOITDB text
Scdbg 1.0 - Buffer overflow DoS
by Rafael Pedrero
EIP-2026-115389 EXPLOITDB text
Hex Workshop v6.7 - Buffer overflow DoS
by Rafael Pedrero
CVE-2019-13068 EXPLOITDB MEDIUM text VERIFIED
Grafana < 6.2.5 - XSS
public/app/features/panel/panel_ctrl.ts in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field).
by SimranJeet Singh
CVSS 5.4
CVE-2022-39291 EXPLOITDB MEDIUM python VERIFIED
Zoneminder < 1.36.27 - Improper Input Validation
ZoneMinder is a free, open source Closed-circuit television software application. Affected versions of zoneminder are subject to a vulnerability which allows users with "View" system permissions to inject new data into the logs stored by Zoneminder. This was observed through an HTTP POST request containing log information to the "/zm/index.php" endpoint. Submission is not rate controlled and could affect database performance and/or consume all storage resources. Users are advised to upgrade. There are no known workarounds for this issue.
by Trenches of IT
CVSS 5.4
EIP-2026-114615 EXPLOITDB text
Zentao Project Management System 17.0 - Authenticated Remote Code Execution (RCE)
by mister0xf
EIP-2026-114384 EXPLOITDB text
WPN-XM Serverstack for Windows 0.8.6 - Multiple Vulnerabilities
by Rafael Pedrero
EIP-2026-113376 EXPLOITDB text
WebTareas 2.4 - Reflected XSS (Unauthorised)
by Hubert Wojciechowski
EIP-2026-107125 EXPLOITDB text
FlatCore CMS 2.1.1 - Stored Cross-Site Scripting (XSS)
by Sinem Şahin
EIP-2026-105874 EXPLOITDB text
Clansphere CMS 2011.4 - Stored Cross-Site Scripting (XSS)
by Sinem Şahin
EIP-2026-105707 EXPLOITDB text
Canteen-Management v1.0 - XSS-Reflected
by nu11secur1ty
EIP-2026-105706 EXPLOITDB text
Canteen-Management v1.0 - SQL Injection
by nu11secur1ty
EIP-2026-105004 EXPLOITDB text
Aero CMS v0.0.1 - SQL Injection (no auth)
by Hubert Wojciechowski
EIP-2026-105003 EXPLOITDB text
Aero CMS v0.0.1 - PHP Code Injection (auth)
by Hubert Wojciechowski
CVE-2022-40684 EXPLOITDB CRITICAL bash
Fortinet Fortiproxy < 7.0.7 - Authentication Bypass
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
by Felipe Alcantara
CVSS 9.8
EIP-2026-102477 EXPLOITDB text
Desktop Central 9.1.0 - Multiple Vulnerabilities
by Rafael Pedrero