Exploitdb Exploits

50,135 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-107624 EXPLOITDB text
Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS)
by Sant268
EIP-2026-117565 EXPLOITDB text
Microsoft Windows Defender - Detections Bypass
by hyp3rlinx
EIP-2026-117546 EXPLOITDB text
Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass
by hyp3rlinx
CVE-2021-24563 EXPLOITDB MEDIUM text
Frontend Uploader < 1.3.2 - XSS
The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly
by Veshraj Ghimire
CVSS 6.1
CVE-2021-40813 EXPLOITDB MEDIUM text
Element-IT HTTP Commander 3.1.9 - XSS
A cross-site scripting (XSS) vulnerability in the "Zip content" feature in Element-IT HTTP Commander 3.1.9 allows remote authenticated users to inject arbitrary web script or HTML via filenames.
by Oscar Sandén
CVSS 5.4
CVE-2022-22836 EXPLOITDB MEDIUM text
Coreftp Core FTP < 1.2 - Path Traversal
CoreFTP Server before 727 allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request.
by LiamInfosec
CVSS 6.5
CVE-2009-0182 EXPLOITDB HIGH python
VUPlayer <2.49 - RCE
Buffer overflow in VUPlayer 2.49 and earlier allows user-assisted attackers to execute arbitrary code via a long URL in a File line in a .pls file, as demonstrated by an http URL on a File1 line.
by Bryan Leong
CVSS 8.8
CVE-2021-44916 EXPLOITDB MEDIUM text
Opmantek Open-audit < 4.2.0 - XSS
Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a Cross Site Scripting (XSS) vulnerability. If a bad value is passed to the routine via a URL, malicious JavaScript code can be executed in the victim's browser.
by Dominic Clark
CVSS 6.1
EIP-2026-110165 EXPLOITDB text
Online Railway Reservation System 1.0 - Remote Code Execution (RCE) (Unauthenticated)
by Zachary Asher
EIP-2026-110164 EXPLOITDB text
Online Railway Reservation System 1.0 - Admin Account Creation (Unauthenticated)
by Zachary Asher
EIP-2026-110163 EXPLOITDB text
Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated)
by Zachary Asher
EIP-2026-110162 EXPLOITDB text
Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated)
by twseptian
EIP-2026-110201 EXPLOITDB text
Online Veterinary Appointment System 1.0 - 'Multiple' SQL Injection
by twseptian
CVE-2022-24248 EXPLOITDB MEDIUM text
RiteCMS <3.1.0 - Path Traversal
RiteCMS version 3.1.0 and below suffers from an arbitrary file deletion via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker might leverage the capability of arbitrary file deletion to circumvent certain web server security mechanisms such as deleting .htaccess file that would deactivate those security constraints.
by faisalfs10x
CVSS 6.5
CVE-2022-24247 EXPLOITDB MEDIUM text
RiteCMS <3.1.0 - Path Traversal
RiteCMS version 3.1.0 and below suffers from an arbitrary file overwrite via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to overwrite any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to write) resulting a remote code execution.
by faisalfs10x
CVSS 6.5
CVE-2023-36375 EXPLOITDB MEDIUM text
Hostel Management System v2.1 - XSS
Cross Site Scripting vulnerability in Hostel Management System v2.1 allows an attacker to execute arbitrary code via a crafted payload to the Guardian name, Guardian relation, complimentary address, city, permanent address, and city parameters in the Book Hostel & Room Details page.
by Chinmay Divekar
CVSS 5.4
CVE-2021-45835 EXPLOITDB CRITICAL python
Online Admission System 1.0 - Code Injection
The Online Admission System 1.0 allows an unauthenticated attacker to upload or transfer files of dangerous types to the application through documents.php, which may be used to execute malicious code or lead to code execution.
by Jeremiasz Pluta
CVSS 9.8
CVE-2022-4985 EXPLOITDB HIGH python
Vodafone H500s <3.5.10 - Info Disclosure
Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
by Daniel Monzón
CVE-2021-47752 EXPLOITDB HIGH python
Sylkat-tools Awebserver - Resource Allocation Without Limits
AWebServer GhostBuilding 18 contains a denial of service vulnerability that allows remote attackers to overwhelm the server by sending multiple concurrent HTTP requests. Attackers can generate high-volume requests to multiple endpoints including /mysqladmin to potentially crash or render the service unresponsive.
by Andres Ramos
CVSS 7.5
CVE-2021-47733 EXPLOITDB MEDIUM text
Cmsimple - XSS
CMSimple 5.4 contains a cross-site scripting vulnerability that allows attackers to bypass input filtering by using HTML to Unicode encoding. Attackers can inject malicious scripts by encoding payloads like ')-alert(1)// and execute arbitrary JavaScript when victims interact with delete buttons.
by heinjame
CVSS 6.1
CVE-2021-46368 EXPLOITDB HIGH text
TRIGONE Remote System Monitor <3.61 - Privilege Escalation
TRIGONE Remote System Monitor 3.61 is vulnerable to an unquoted path service allowing local users to launch processes with elevated privileges.
by Yehia Elghaly
CVSS 7.8
CVE-2021-46367 EXPLOITDB HIGH text
RiteCMS <3.1.0 - RCE
RiteCMS version 3.1.0 and below suffers from a remote code execution vulnerability in the admin panel. An authenticated attacker can upload a PHP file and bypass the .htacess configuration to deny execution of .php files in media and files directory by default.
by faisalfs10x
CVSS 7.2
CVE-2021-35380 EXPLOITDB HIGH text
Solari di Udine TTServer 3.24.0.2 - Path Traversal
A Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download (http://url:port/file?valore).
by Fabiano Golluscio
CVSS 7.5
CVE-2021-43326 EXPLOITDB HIGH powershell
Automox Agent <32 - Privilege Escalation
Automox Agent before 32 on Windows incorrectly sets permissions on a temporary directory.
by Greg Foss
CVSS 7.8
CVE-2021-43857 EXPLOITDB CRITICAL python
Gerapy <0.9.8 - RCE
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
by Jeremiasz Pluta
CVSS 9.8