Exploitdb Exploits

50,135 exploits tracked across all sources.

Sort: Activity Stars
CVE-2020-35576 EXPLOITDB HIGH python
Tp-link Tl-wr841n Firmware < 201216 - OS Command Injection
A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577.
by Koh You Liang
CVSS 8.8
CVE-2009-2265 EXPLOITDB python
FCKeditor <2.6.4.1 - Path Traversal
Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.
by Pergyz
CVE-2021-24383 EXPLOITDB MEDIUM text
Codecabin WP GO Maps < 8.1.12 - XSS
The WP Google Maps WordPress plugin before 8.1.12 did not sanitise, validate of escape the Map Name when output in the Map List of the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue
by Mohammed Adam
CVSS 5.4
EIP-2026-113970 EXPLOITDB text
WordPress Plugin Poll_ Survey_ Questionnaire and Voting system 1.5.2 - 'date_answers' Blind SQL Injection
by Toby Jackson
EIP-2026-112083 EXPLOITDB text
Simple CRM 3.0 - 'email' SQL injection (Authentication Bypass)
by Rinku Kumar
EIP-2026-110139 EXPLOITDB python
Online Library Management System 1.0 - Arbitrary File Upload Remote Code Execution (Unauthenticated)
by Berk Can Geyikci
EIP-2026-110137 EXPLOITDB text
Online Library Management System 1.0 - 'Search' SQL Injection
by Berk Can Geyikci
CVE-2021-35337 EXPLOITDB MEDIUM text
Phone Shop Sales Management System - IDOR
Sourcecodester Phone Shop Sales Managements System 1.0 is vulnerable to Insecure Direct Object Reference (IDOR). Any attacker will be able to see the invoices of different users by changing the id parameter.
by Pratik Khalane
CVSS 4.3
EIP-2026-111753 EXPLOITDB python
Responsive Tourism Website 3.1 - Remote Code Execution (RCE) (Unauthenticated)
by Tagoletta
CVE-2021-47804 EXPLOITDB HIGH text
Wise Care 365 <5.6.7.568 - Code Injection
Wise Care 365 5.6.7.568 contains an unquoted service path vulnerability in the WiseBootAssistant service running with LocalSystem privileges. Attackers can exploit this by inserting a malicious executable in the service path, which will execute with elevated system privileges when the service restarts.
by Julio Aviña
CVSS 7.8
CVE-2021-47803 EXPLOITDB HIGH text
iFunbox 4.2 - Code Injection
iFunbox 4.2 contains an unquoted service path vulnerability in the Apple Mobile Device Service that allows local attackers to execute code with elevated privileges. Attackers can insert a malicious executable into the unquoted service path to run with LocalSystem privileges when the service restarts.
by Julio Aviña
CVSS 7.8
CVE-2021-37221 EXPLOITDB HIGH text
Customer Relationship Management System - Unrestricted File Upload
A file upload vulnerability exists in Sourcecodester Customer Relationship Management System 1.0 via the account update option & customer create option, which could let a remote malicious user upload an arbitrary php file. .
by Ishan Saha
CVSS 8.8
CVE-2021-35448 EXPLOITDB HIGH text VERIFIED
Emote Interactive Remote Mouse 3.008 - RCE
Emote Interactive Remote Mouse 3.008 on Windows allows attackers to execute arbitrary programs as Administrator by using the Image Transfer Folder feature to navigate to cmd.exe. It binds to local ports to listen for incoming connections.
by Salman Asad
CVSS 7.8
EIP-2026-117416 EXPLOITDB text
Lexmark Printer Software G2 Installation Package 1.8.0.0 - 'LM__bdsvc' Unquoted Service Path
by Julio Aviña
CVE-2020-14871 EXPLOITDB CRITICAL python
Oracle Solaris 10-11 - Privilege Escalation
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
by Nathaniel Singer
CVSS 10.0
CVE-2021-32305 EXPLOITDB CRITICAL python VERIFIED
Websvn < 2.6.1 - OS Command Injection
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
by g0ldm45k
CVSS 9.8
EIP-2026-112084 EXPLOITDB text
Simple CRM 3.0 - 'name' Stored Cross site scripting (XSS)
by Riadh Benlamine
EIP-2026-112082 EXPLOITDB html
Simple CRM 3.0 - 'Change user information' Cross-Site Request Forgery (CSRF)
by Riadh Benlamine
CVE-2019-14530 EXPLOITDB HIGH python
OpenEMR <5.0.2 - Info Disclosure
An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.
by Ron Jost
CVSS 8.8
EIP-2026-107727 EXPLOITDB xml
ICE Hrm 29.0.0.OS - 'xml upload' Stored Cross-Site Scripting (XSS)
by Piyush Patil
EIP-2026-107726 EXPLOITDB text
ICE Hrm 29.0.0.OS - 'Account Takeover' Cross-Site Request Forgery (CSRF)
by Piyush Patil
CVE-2017-5941 EXPLOITDB CRITICAL javascript
Node-serialize < 0.0.4 - Insecure Deserialization
An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
by Beren Kuday GÖRÜN
CVSS 9.8
EIP-2026-101255 EXPLOITDB text
Dlink DSL2750U - 'Reboot' Command Injection
by Mohammed Hadi
CVE-2023-38890 EXPLOITDB HIGH python
Online Shopping Portal Project 3.1 - SQL Injection
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
by Tagoletta
CVSS 8.8
CVE-2021-47807 EXPLOITDB HIGH text
Sync Breeze 13.6.18 - Code Injection
Sync Breeze 13.6.18 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in service binaries located in 'Program Files' directories to inject malicious executables and escalate privileges.
by Brian Rodriguez
CVSS 7.8