Exploitdb Exploits

50,135 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-113045 EXPLOITDB text
Vehicle Parking Tracker System 1.0 - 'Owner Name' Stored Cross-Site Scripting
by Anmol K Sachan
EIP-2026-112923 EXPLOITDB text
User Management System 1.0 - 'uid' SQL Injection
by Zeyad Azima
EIP-2026-111803 EXPLOITDB python
Roundcube Webmail 1.2 - File Disclosure
by stonepresto
EIP-2026-110481 EXPLOITDB text VERIFIED
Park Ticketing Management System 1.0 - 'viewid' SQL Injection
by Zeyad Azima
CVE-2021-3317 EXPLOITDB HIGH python
Klogserver Klog Server < 2.4.1 - OS Command Injection
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
by Metin Yunus Kandemir
CVSS 8.8
EIP-2026-105549 EXPLOITDB html
bloofoxCMS 0.5.2.1 - CSRF (Add user)
by LiPeiYi
CVE-2021-47906 EXPLOITDB MEDIUM text
BloofoxCMS 0.5.2.1 - XSS
BloofoxCMS 0.5.2.1 contains a stored cross-site scripting vulnerability in the articles text parameter that allows authenticated attackers to inject malicious scripts. Attackers can insert malicious javascript payloads in the text field to execute scripts and potentially steal authenticated users' cookies.
by LiPeiYi
CVSS 6.4
CVE-2021-31650 EXPLOITDB CRITICAL text
Online Grading System - SQL Injection
A SQL injection vulnerability in Sourcecodester Online Grading System 1.0 allows remote attackers to execute arbitrary SQL commands via the uname parameter.
by Ruchi Tiwari
CVSS 9.8
EIP-2026-114680 EXPLOITDB python
Home Assistant Community Store (HACS) 1.10.0 - Directory Traversal
by Lyghtnox
EIP-2026-112138 EXPLOITDB text
Simple Public Chat Room 1.0 - Authentication Bypass SQLi
by Richard Jones
EIP-2026-112137 EXPLOITDB text
Simple Public Chat Room 1.0 - 'msg' Stored Cross-Site Scripting
by Richard Jones
CVE-2020-35754 EXPLOITDB HIGH python
Opensolution Quick.cart < 6.7 - Code Injection
OpenSolution Quick.CMS < 6.7 and Quick.Cart < 6.7 allow an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Language tab.
by mari0x00
CVSS 7.2
CVE-2021-3337 EXPLOITDB HIGH text
Hide Thread Content - Incorrect Authorization
The Hide-Thread-Content plugin through 2021-01-27 for MyBB allows remote attackers to bypass intended content-reading restrictions by clicking on reply or quote in the postbit.
by 0xB9
CVSS 7.5
EIP-2026-102020 EXPLOITDB python
SonicWall SSL-VPN 8.0.0.0 - 'visualdoor' Remote Code Execution (Unauthenticated)
by Darren Martyn
CVE-2020-36115 EXPLOITDB MEDIUM text
Egavilanmedia Phpcrud - XSS
Stored Cross Site Scripting (XSS) vulnerability in EGavilan Media CRUD Operation with PHP, MySQL, Bootstrap, and Dompdf via First Name or Last Name parameter in the 'Add New Record Feature'.
by Mahendra Purbia
CVSS 5.4
EIP-2026-114092 EXPLOITDB text
WordPress Plugin SuperForms 4.9 - Arbitrary File Upload
by ABDO10
EIP-2026-110295 EXPLOITDB ruby
OpenEMR 5.0.1 - Remote Code Execution (Authenticated) (2)
by Alexandre ZANNI
CVE-2018-16763 EXPLOITDB CRITICAL ruby
FUEL CMS 1.4.1 - RCE
FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.
by Alexandre ZANNI
CVSS 9.8
CVE-2020-25557 EXPLOITDB HIGH ruby
Cmsuno - Code Injection
In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.
by Alexandre ZANNI
CVSS 8.8
CVE-2020-7384 EXPLOITDB HIGH python
Rapid7 Metasploit < 4.19.0 - Command Injection
Rapid7's Metasploit msfvenom framework handles APK files in a way that allows for a malicious user to craft and publish a file that would execute arbitrary commands on a victim's machine.
by Justin Steven
CVSS 7.0
EIP-2026-103527 EXPLOITDB html
jQuery UI 1.12.1 - Denial of Service (DoS)
by Rafael Cintra Lopes
EIP-2026-100666 EXPLOITDB python
Umbraco CMS 7.12.4 - Remote Code Execution (Authenticated)
by Alexandre ZANNI
CVE-2021-47724 EXPLOITDB MEDIUM text
Stvs Provision - Path Traversal
STVS ProVision 5.9.10 contains a path traversal vulnerability that allows authenticated attackers to access arbitrary files by manipulating the files parameter in the archive download functionality. Attackers can send GET requests to /archive/download with directory traversal sequences to read sensitive system files like /etc/passwd.
by LiquidWorm
CVSS 6.5
CVE-2021-47723 EXPLOITDB HIGH html
STVS ProVision 5.9.10 - CSRF
STVS ProVision 5.9.10 contains a cross-site request forgery vulnerability that allows attackers to perform actions with administrative privileges by exploiting unvalidated HTTP requests. Attackers can visit malicious web sites to trigger the forge request, allowing them to create new admin users.
by LiquidWorm
CVSS 8.8
EIP-2026-104372 EXPLOITDB text VERIFIED
Openlitespeed Web Server 1.7.8 - Command Injection (Authenticated) (1)
by SunCSR