Exploitdb Exploits

50,135 exploits tracked across all sources.

Sort: Activity Stars
CVE-2021-27308 EXPLOITDB MEDIUM text
4images <1.8 - XSS
A cross-site scripting (XSS) vulnerability in the admin login panel in 4images version 1.8 allows remote attackers to inject JavaScript via the "redirect" parameter.
by Piyush Patil
CVSS 4.8
CVE-2021-31642 EXPLOITDB MEDIUM text
Chiyu-tech Semac S2 Firmware - Integer Overflow
A denial of service condition exists after an integer overflow in several IoT devices from CHIYU Technology, including BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC. The vulnerability can be explored by sending an unexpected integer (> 32 bits) on the page parameter that will crash the web portal and making it unavailable until a reboot of the device.
by sirpedrotavares
CVSS 6.5
CVE-2021-31251 EXPLOITDB CRITICAL python
Chiyu-tech Bf-430 Firmware - Authentication Bypass
An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.
by sirpedrotavares
CVSS 9.8
CVE-2021-47816 EXPLOITDB HIGH python
Thecus N4800Eco - Command Injection
Thecus N4800Eco NAS Server Control Panel contains a command injection vulnerability that allows authenticated attackers to execute arbitrary system commands through user management endpoints. Attackers can inject commands via username and batch user creation parameters to execute shell commands with administrative privileges.
by Metin Yunus Kandemir
CVSS 8.8
EIP-2026-117324 EXPLOITDB text
Intel(R) Audio Service x64 01.00.1080.0 - 'IntelAudioService' Unquoted Service Path
by Geovanni Ruiz
CVE-2021-21337 EXPLOITDB MEDIUM text
Zope Products.pluggableauthservice < 2.6.1 - Open Redirect
Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an open redirect vulnerability. A maliciously crafted link to the login form and login functionality could redirect the browser to a different website. The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install "Products.PluggableAuthService>=2.6.1".
by Piyush Patil
CVSS 5.7
CVE-2021-28417 EXPLOITDB MEDIUM text
Seo Panel 4.8.0 - XSS
A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php and the "search_name" parameter.
by Piyush Patil
CVSS 4.8
CVE-2021-28418 EXPLOITDB MEDIUM text
Seo Panel 4.8.0 - XSS
A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via settings.php and the "category" parameter.
by Piyush Patil
CVSS 4.8
CVE-2014-8722 EXPLOITDB HIGH python
GetSimple CMS 3.3.4 - Info Disclosure
GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to (1) data/users/<username>.xml, (2) backups/users/<username>.xml.bak, (3) data/other/authorization.xml, or (4) data/other/appid.xml.
by Ron Jost
CVSS 7.5
CVE-2020-13927 EXPLOITDB CRITICAL python
Apache Airflow < 1.10.11 - Missing Authentication
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default
by Pepe Berba
CVSS 9.8
CVE-2021-47820 EXPLOITDB MEDIUM html
Ubee EVW327 - CSRF
Ubee EVW327 contains a cross-site request forgery vulnerability that allows attackers to enable remote access without user interaction. Attackers can craft a malicious webpage that automatically submits a form to change router remote access settings to port 8080 without the user's consent.
by lated
CVSS 5.3
CVE-2021-47819 EXPLOITDB CRITICAL text
ProjeQtOr Project Management 9.1.4 - RCE
ProjeQtOr Project Management 9.1.4 contains a file upload vulnerability that allows guest users to upload malicious PHP files with arbitrary code execution capabilities. Attackers can upload a PHP script through the profile attachment section and execute system commands by accessing the uploaded file with a specially crafted request parameter.
by Temel Demir
CVSS 9.8
CVE-2021-47818 EXPLOITDB HIGH python
DupTerminator <1.4.5639.37199 - DoS
DupTerminator 1.4.5639.37199 contains a denial of service vulnerability that allows attackers to crash the application by inputting a long character string in the Excluded text box. Attackers can generate a payload of 8000 repeated characters to trigger the application to stop working on Windows 10.
by Brian Rodriguez
CVSS 7.5
CVE-2020-15261 EXPLOITDB HIGH text
Veyon Service <4.4.2 - Privilege Escalation
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.
by Víctor García
CVSS 8.0
EIP-2026-114226 EXPLOITDB text
WordPress Plugin WP Prayer version 1.6.1 - 'prayer_messages' Stored Cross-Site Scripting (XSS) (Authenticated)
by Bastijn Ouwendijk
CVE-2018-16167 EXPLOITDB CRITICAL python
Jpcert Logontracer < 1.2.0 - OS Command Injection
LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.
by g0ldm45k
CVSS 9.8
EIP-2026-104176 EXPLOITDB python
Atlassian Jira 8.15.0 - Information Disclosure (Username Enumeration)
by Mohammed Aloraimi
EIP-2026-100775 EXPLOITDB text
CHIYU TCP/IP Converter devices - CRLF injection
by sirpedrotavares
EIP-2026-100774 EXPLOITDB text
CHIYU IoT devices - 'Multiple' Cross-Site Scripting (XSS)
by sirpedrotavares
CVE-2021-24308 EXPLOITDB MEDIUM text
Lifterlms < 4.21.1 - XSS
The 'State' field of the Edit profile page of the LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin for WordPress plugin before 4.21.1 is not properly sanitised when output in the About section of the profile page, leading to a stored Cross-Site Scripting issue. This could allow low privilege users (such as students) to elevate their privilege via an XSS attack when an admin will view their profile.
by Captain_hook
CVSS 5.4
CVE-2017-14535 EXPLOITDB HIGH python
Trixbox - 2.8.0.4 OS Command Injection
trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
by Ron Jost
CVSS 8.8
CVE-2017-14537 EXPLOITDB MEDIUM python
Trixbox 2.8.0 - Path Traversal
trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php.
by Ron Jost
CVSS 6.5
CVE-2020-24949 EXPLOITDB HIGH python VERIFIED
Php-fusion - Privilege Escalation
Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
by g0ldm45k
CVSS 8.8
EIP-2026-103322 EXPLOITDB ruby
Selenium 3.141.59 - Remote Code Execution (Firefox/geckodriver)
by Jon Stratton
CVE-2021-33570 EXPLOITDB MEDIUM python
Postbird 0.8.4 - XSS
Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.
by Debshubra Chakraborty
CVSS 5.4