Exploitdb Exploits

50,135 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-114235 EXPLOITDB text
WordPress Plugin WP Super Cache 1.7.1 - Remote Code Execution (Authenticated)
by m0ze
CVE-2021-3111 EXPLOITDB MEDIUM text
Concretecms Concrete Cms < 8.5.5 - XSS
The Express Entries Dashboard in Concrete5 8.5.4 allows stored XSS via the name field of a new data object at an index.php/dashboard/express/entries/view/ URI.
by Quadron Research Lab
CVSS 4.8
EIP-2026-102058 EXPLOITDB text
TP-Link Devices - 'setDefaultHostname' Stored Cross-site Scripting (Unauthenticated)
by Smriti Gaba
CVE-2021-47860 EXPLOITDB MEDIUM html
GetSimple CMS Custom JS 0.1 - CSRF
GetSimple CMS Custom JS 0.1 plugin contains a cross-site request forgery vulnerability that allows unauthenticated attackers to inject arbitrary client-side code into administrator browsers. Attackers can craft a malicious website that triggers a cross-site scripting payload to execute remote code on the hosting server when an authenticated administrator visits the page.
by Abhishek Joshi
CVSS 5.3
CVE-2021-47857 EXPLOITDB HIGH text
Moodle 3.10.3 - XSS
Moodle 3.10.3 contains a persistent cross-site scripting vulnerability in the calendar event subtitle field that allows attackers to inject malicious scripts. Attackers can craft a calendar event with malicious JavaScript in the subtitle track label to execute arbitrary code when users view the event.
by Vincent666
CVSS 7.2
EIP-2026-111736 EXPLOITDB text
Regis Inventory And Monitoring System 1.0 - 'Item List' Persistent Cross-Site Scripting
by George Tsimpidas
CVE-2021-47858 EXPLOITDB HIGH text
Genexis Platinum-4410 P4410-V2-1.31A - XSS
Genexis Platinum-4410 P4410-V2-1.31A contains a stored cross-site scripting vulnerability in the 'start_addr' parameter of the Security Management interface. Attackers can inject malicious scripts through the start source address field that will persist and trigger for privileged users when they access the security management page.
by Jithin KS
CVSS 7.2
CVE-2021-29343 EXPLOITDB MEDIUM text
Ovidentia < 6.7.7 - SQL Injection
Ovidentia CMS 6.x contains a SQL injection vulnerability in the "id" parameter of index.php. The "checkbox" property into "text" data can be extracted and displayed in the text region or in source code.
by Felipe Prates Donato
CVSS 5.4
CVE-2020-14209 EXPLOITDB HIGH python
Dolibarr < 11.0.5 - Unrestricted File Upload
Dolibarr before 11.0.5 allows low-privilege users to upload files of dangerous types, leading to arbitrary code execution. This occurs because .pht and .phar files can be uploaded. Also, a .htaccess file can be uploaded to reconfigure access control (e.g., to let .noexe files be executed as PHP code to defeat the .noexe protection mechanism).
by Andrea Gonzalez
CVSS 8.8
CVE-2012-6708 EXPLOITDB MEDIUM text
Jquery < 1.9.0 - XSS
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
by MiningOmerta
CVSS 6.1
CVE-2021-43463 EXPLOITDB HIGH text
Ext2Fsd 0.68 - Buffer Overflow
An Unquoted Service Path vulnerability exists in Ext2Fsd v0.68 via a specially crafted file in the Ext2Srv Service executable service path.
by Mohammed Alshehri
CVSS 7.8
CVE-2021-47862 EXPLOITDB HIGH text
Hi-Rez Studios 5.1.6.3 - Code Injection
Hi-Rez Studios 5.1.6.3 contains an unquoted service path vulnerability in the HiPatchService that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted path during system startup or reboot to inject and run malicious executables with LocalSystem permissions.
by Ekrem Can Kök
CVSS 7.8
CVE-2021-47861 EXPLOITDB HIGH text
Event Log Explorer 4.9.3 - Privilege Escalation
Event Log Explorer 4.9.3 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted service path by placing malicious executables in specific file system locations that will be executed with LocalSystem account privileges during service startup.
by Alan Mondragon
CVSS 7.8
CVE-2021-47859 EXPLOITDB HIGH text
ActivIdentity 8.2 - Local Privilege Escalation
ActivIdentity 8.2 contains an unquoted service path vulnerability in the ac.sharedstore service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path in C:\Program Files\Common Files\ActivIdentity\ to inject malicious executables and escalate privileges.
by SamAlucard
CVSS 7.8
EIP-2026-117121 EXPLOITDB text
ELAN Touchpad 15.2.13.1_X64_WHQL - 'ETDService' Unquoted Service Path
by SamAlucard
CVE-2021-27946 EXPLOITDB HIGH text
MyBB <1.8.26 - SQL Injection
SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count. (issue 1 of 3).
by SivertPL
CVSS 8.8
EIP-2026-107644 EXPLOITDB text
Hotel And Lodge Management System 1.0 - 'Customer Details' Stored XSS
by Jitendra Kumar Tripathi
CVE-2018-14009 EXPLOITDB CRITICAL python VERIFIED
Codiad <2.8.4 - RCE
Codiad through 2.8.4 allows Remote Code Execution, a different vulnerability than CVE-2017-11366 and CVE-2017-15689.
by WangYihang
CVSS 9.8
CVE-2021-47868 EXPLOITDB HIGH text
WIN-PACK PRO 4.8 - Privilege Escalation
WIN-PACK PRO 4.8 contains an unquoted service path vulnerability in the WPCommandFileService that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files <x86>\WINPAKPRO\WPCommandFileService Service.exe to inject malicious code that would execute with LocalSystem permissions.
by Alan Mondragon
CVSS 7.8
CVE-2021-47867 EXPLOITDB HIGH text
WIN-PACK PRO4.8 - Privilege Escalation
WIN-PACK PRO4.8 contains an unquoted service path vulnerability in the ScheduleService that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted path in 'C:\Program Files <x86>\WINPAKPRO\ScheduleService Service.exe' to inject malicious code that would execute during service startup.
by Alan Mondragon
CVSS 7.8
CVE-2021-47866 EXPLOITDB HIGH text
WIN-PACK PRO 4.8 - Privilege Escalation
WIN-PACK PRO 4.8 contains an unquoted service path vulnerability in the GuardTourService that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted path in C:\Program Files <x86>\WINPAKPRO\WP GuardTour Service.exe to inject malicious code that would execute during service startup.
by Alan Mondragon
CVSS 7.8
CVE-2021-47865 EXPLOITDB HIGH python
ProFTPD 1.3.7a - DoS
ProFTPD 1.3.7a contains a denial of service vulnerability that allows attackers to overwhelm the server by creating multiple simultaneous FTP connections. Attackers can repeatedly establish connections using threading to exhaust server connection limits and block legitimate user access.
by xynmaps
CVSS 7.5
CVE-2021-47864 EXPLOITDB HIGH text
OSAS Traverse Extension 11 - Path Traversal
OSAS Traverse Extension 11 contains an unquoted service path vulnerability in the TravExtensionHostSvc service running with LocalSystem privileges. Attackers can exploit the unquoted path to inject and execute malicious code by placing executable files in the service's path, potentially gaining elevated system access.
by Johnny Tech
CVSS 7.8
CVE-2021-47863 EXPLOITDB HIGH text
MacPaw Encrypto 1.0.1 - Code Injection
MacPaw Encrypto 1.0.1 contains an unquoted service path vulnerability in its Encrypto Service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:\Program Files\Encrypto\ to inject malicious executables and escalate privileges on Windows systems.
by Ismael Nava
CVSS 7.8
EIP-2026-117896 EXPLOITDB text
SAPSetup Automatic Workstation Update Service 750 - 'NWSAPAutoWorkstationUpdateSvc' Unquoted Service Path
by Alan Mondragon