Exploitdb Exploits

50,135 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-102926 EXPLOITDB c
Mini-XML 3.2 - Heap Overflow
by LIWEI
CVE-2021-20837 EXPLOITDB CRITICAL ruby VERIFIED
Movable Type <7 r.5002 - RCE
Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
by Charl-Alexandre Le Brun
CVSS 9.8
CVE-2021-43137 EXPLOITDB HIGH html
Hostel Management System 2.1 - XSS, CSRF
Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exits in hostel management system 2.1 via the name field in my-profile.php. Chaining to this both vulnerabilities leads to account takeover.
by Anubhav Singh
CVSS 8.8
EIP-2026-114095 EXPLOITDB text
WordPress Plugin Supsystic Contact Form 1.7.18 - 'label' Stored Cross-Site Scripting (XSS)
by Murat DEMİRCİ
EIP-2026-113747 EXPLOITDB text
WordPress Plugin Filterable Portfolio Gallery 1.0 - 'title' Stored Cross-Site Scripting (XSS)
by Murat DEMİRCİ
CVE-2021-42666 EXPLOITDB HIGH text
Engineers Online Portal - SQL Injection
A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
by Alon Leviev
CVSS 8.8
CVE-2021-42665 EXPLOITDB CRITICAL text
Engineers Online Portal - SQL Injection
An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication.
by Alon Leviev
CVSS 9.8
CVE-2021-42664 EXPLOITDB MEDIUM text
Engineers Online Portal - XSS
A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
by Alon Leviev
CVSS 5.4
CVE-2021-42662 EXPLOITDB MEDIUM text
Online Event Booking And Reservation System - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
by Alon Leviev
CVSS 5.4
CVE-2021-47777 EXPLOITDB HIGH text
Build Smart ERP 21.0817 - SQL Injection
Build Smart ERP 21.0817 contains an unauthenticated SQL injection vulnerability in the 'eidValue' parameter of the login validation endpoint. Attackers can inject stacked SQL queries using payloads like ';WAITFOR DELAY '0:0:3'-- to manipulate database queries and potentially extract or modify database information.
by Nehru Sethuraman
CVSS 8.2
CVE-2021-37364 EXPLOITDB HIGH text
Openclinic GA - Incorrect Permission Assignment
OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.
by Alessandro Salzano
CVSS 7.8
CVE-2021-37363 EXPLOITDB HIGH text
Gestionaleopen Gestionale Open - Incorrect Default Permissions
An Insecure Permissions issue exists in Gestionale Open 11.00.00. A low privilege account is able to rename the mysqld.exe file located in bin folder and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.
by Alessandro Salzano
CVSS 7.8
EIP-2026-117682 EXPLOITDB text
Netgear Genie 2.4.64 - Unquoted Service Path
by Mert Daş
CVE-2021-24444 EXPLOITDB MEDIUM text
Taxopress < 3.0.7.2 - XSS
The TaxoPress – Create and Manage Taxonomies, Tags, Categories WordPress plugin before 3.0.7.2 does not sanitise its Taxonomy description field, allowing high privilege users to set JavaScript payload in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue.
by Akash Patil
CVSS 4.8
EIP-2026-113931 EXPLOITDB text
WordPress Plugin Ninja Tables 4.1.7 - Stored Cross-Site Scripting (XSS)
by Akash Patil
EIP-2026-113887 EXPLOITDB text
WordPress Plugin Media-Tags 3.2.0.2 - Stored Cross-Site Scripting (XSS)
by Akash Patil
EIP-2026-113476 EXPLOITDB javascript VERIFIED
Wordpress 4.9.6 - Arbitrary File Deletion (Authenticated) (2)
by samguy
CVE-2018-12613 EXPLOITDB HIGH python VERIFIED
phpMyAdmin 4.8.x <4.8.2 - Code Injection
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
by samguy
CVSS 8.8
EIP-2026-106883 EXPLOITDB text
Engineers Online Portal 1.0 - File Upload Remote Code Execution (RCE)
by SadKris
EIP-2026-105379 EXPLOITDB text
Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated)
by blockomat2100
CVE-2021-42013 EXPLOITDB CRITICAL bash
Apache HTTP Server < 9.2.6.0 - Path Traversal
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
by ThelastVvV
CVSS 9.8
CVE-2021-36260 EXPLOITDB CRITICAL python
Hikvision IP Camera Unauthenticated Command Injection
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
by bashis
CVSS 9.8
EIP-2026-110077 EXPLOITDB text
Online Course Registration 1.0 - Blind Boolean-Based SQL Injection (Authenticated)
by Sam Ferguson
EIP-2026-105921 EXPLOITDB python
Clinic Management System 1.0 - SQL injection to Remote Code Execution
by Pablo Santiago
CVE-2021-28164 EXPLOITDB MEDIUM text
Eclipse Jetty - Information Disclosure
In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
by Mayank Deshmukh
CVSS 5.3