Exploitdb Exploits

50,186 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-101989 EXPLOITDB text
Seowon SlC 130 Router - Remote Code Execution
by maj0rmil4d
CVE-2020-24841 EXPLOITDB CRITICAL text
SDG Pnpscada - SQL Injection
PNPSCADA 2.200816204020 allows SQL injection via parameter 'interf' in /browse.jsp. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
by İsmail ERKEK
CVSS 9.8
CVE-2020-35249 EXPLOITDB MEDIUM text
Elkarbackup - XSS
Cross Site Scripting (XSS) vulnerability in ElkarBackup 1.3.3, allows attackers to execute arbitrary code via the name parameter to the add client feature.
by Enes Özeser
CVSS 6.1
CVE-2020-37015 EXPLOITDB HIGH text
Ruijie Networks Switch eWeb S29_RGOS 11.4 - Path Traversal
Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. Attackers can exploit the /download.do endpoint with '../' sequences to retrieve system configuration files containing credentials and network settings.
by Tuygun
CVSS 7.5
CVE-2020-24862 EXPLOITDB HIGH text
Pharmacy Medical Store And Sale Point - SQL Injection
The catID parameter in Pharmacy Medical Store and Sale Point v1.0 has been found to be vulnerable to a Time-Based blind SQL injection via the /medical/inventories.php path which allows attackers to retrieve all databases.
by Moaaz Taha
CVSS 7.5
CVE-2020-24609 EXPLOITDB MEDIUM text
Savsoft Quiz <5.5 - XSS
TechKshetra Info Solutions Pvt. Ltd Savsoft Quiz 5.5 and earlier has XSS which can result in an attacker injecting the XSS payload in the User Registration section and each time the admin visits the manage user section from the admin panel, the XSS triggers and the attacker can steal the cookie via crafted payload.
by Mayur Parmar
CVSS 6.1
CVE-2020-36899 EXPLOITDB HIGH text
QiHang Media Web Digital Signage 3.0.9 - Info Disclosure
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file disclosure vulnerability that allows remote attackers to access sensitive files through unverified 'filename' and 'path' parameters. Attackers can exploit the QH.aspx endpoint to read arbitrary files and directory contents without authentication by manipulating download and getAll actions.
by LiquidWorm
CVSS 7.5
CVE-2020-36898 EXPLOITDB CRITICAL text
QiHang Media Web Digital Signage 3.0.9 - Path Traversal
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file deletion vulnerability in the QH.aspx endpoint that allows remote attackers to delete files without authentication. Attackers can exploit the 'data' parameter by sending a POST request with file paths to delete arbitrary files with web server permissions using directory traversal sequences.
by LiquidWorm
CVSS 9.1
CVE-2020-36897 EXPLOITDB CRITICAL text
QiHang Media Web Digital Signage 3.0.9 - RCE
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit the file upload functionality by using the 'remotePath' and 'fileToUpload' parameters to write and execute arbitrary system commands on the server.
by LiquidWorm
CVSS 9.8
CVE-2020-36896 EXPLOITDB HIGH text
QiHang Media Web Digital Signage 3.0.9 - Auth Bypass
QiHang Media Web Digital Signage 3.0.9 contains a cleartext credentials vulnerability that allows unauthenticated attackers to access administrative login information through an unprotected XML file. Attackers can retrieve hardcoded admin credentials by requesting the '/xml/User/User.xml' file, enabling direct authentication bypass.
by LiquidWorm
CVSS 7.5
CVE-2019-17240 EXPLOITDB CRITICAL ruby VERIFIED
Bludit - Brute Force
bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
by Alexandre ZANNI
CVSS 9.8
CVE-2020-1147 EXPLOITDB HIGH python
Microsoft .net Core < 15.9 - Remote Code Execution
A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
by West Shepherd
CVSS 7.8
CVE-2020-23837 EXPLOITDB HIGH text
GetSimple CMS Multi User 1.8.2 - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability in the Multi User plugin 1.8.2 for GetSimple CMS allows remote attackers to add admin (or other) users after an authenticated admin visits a third-party site or clicks on a URL.
by boku
CVSS 8.8
CVE-2020-17506 EXPLOITDB CRITICAL python
Artica Web Proxy 4.30.00000000 - SQL Injection
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
by Dan Duffy
CVSS 9.8
CVE-2020-17462 EXPLOITDB HIGH text
CMS Made Simple <2.2.14 - Auth Bypass
CMS Made Simple 2.2.14 allows Authenticated Arbitrary File Upload because the File Manager does not block .ptar files, a related issue to CVE-2017-16798.
by Roel van Beurden
CVSS 7.8
EIP-2026-113010 EXPLOITDB text
vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution
by zenofex
EIP-2026-107303 EXPLOITDB text
Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated)
by Roel van Beurden
CVE-2020-37016 EXPLOITDB HIGH text
BarcodeOCR 19.3.6 - Code Injection
BarcodeOCR 19.3.6 contains an unquoted service path vulnerability that allows local attackers to execute code with elevated privileges during system startup. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will run with LocalSystem privileges.
by Daniel Bertoni
CVSS 7.8
CVE-2020-23836 EXPLOITDB HIGH text
OSWA-INV <2020-08-10 - CSRF
A Cross-Site Request Forgery (CSRF) vulnerability in edit_user.php in OSWAPP Warehouse Inventory System (aka OSWA-INV) through 2020-08-10 allows remote attackers to change the admin's password after an authenticated admin visits a third-party site.
by boku
CVSS 8.8
CVE-2020-11552 EXPLOITDB CRITICAL text
Zohocorp ManageEngine ADSelfService Plus < 6003 - Privilege Escalation
An elevation of privilege vulnerability exists in ManageEngine ADSelfService Plus before build 6003 because it does not properly enforce user privileges associated with a Certificate dialog. This vulnerability could allow an unauthenticated attacker to escalate privileges on a Windows host. An attacker does not require any privilege on the target system in order to exploit this vulnerability. One option is the self-service option on the Windows login screen. Upon selecting this option, the thick-client software is launched, which connects to a remote ADSelfService Plus server to facilitate self-service operations. An unauthenticated attacker having physical access to the host could trigger a security alert by supplying a self-signed SSL certificate to the client. The View Certificate option from the security alert allows an attacker to export a displayed certificate to a file. This can further cascade to a dialog that can open Explorer as SYSTEM. By navigating from Explorer to \windows\system32, cmd.exe can be launched as a SYSTEM.
by Bhadresh Patel
CVSS 9.8
CVE-2020-36900 EXPLOITDB HIGH text
All-Dynamics Digital Signage System 2.0.2 - CSRF
All-Dynamics Digital Signage System 2.0.2 contains a cross-site request forgery vulnerability that allows attackers to create administrative users without proper request validation. Attackers can craft a malicious web page that automatically submits forms to create a new user with global administrative privileges when a logged-in user visits the page.
by LiquidWorm
CVSS 8.8
EIP-2026-106341 EXPLOITDB text
Daily Expenses Management System 1.0 - 'item' SQL Injection
by screetsec
CVE-2020-37017 EXPLOITDB HIGH text
CodeMeter 6.60 - Privilege Escalation
CodeMeter 6.60 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the CodeMeter Runtime Server service to inject malicious code that would execute with LocalSystem permissions.
by Luis Martínez
CVSS 7.8
CVE-2020-29280 EXPLOITDB CRITICAL text
Victor CMS v1.0 - SQL Injection
The Victor CMS v1.0 application is vulnerable to SQL injection via the 'search' parameter on the search.php page.
by screetsec
CVSS 9.8
CVE-2020-36994 EXPLOITDB MEDIUM python
QlikView 12.50.20000.0 - DoS
QlikView 12.50.20000.0 contains a denial of service vulnerability in the FTP server address input field that allows local attackers to crash the application. Attackers can paste a 300-character buffer into the FTP server address field to trigger an application crash and prevent normal functionality.
by Luis Martínez
CVSS 6.2