Exploitdb Exploits

50,186 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-113009 EXPLOITDB python
vBulletin 5.6.1 - 'nodeId' SQL Injection
by Photubias
CVE-2019-15083 EXPLOITDB MEDIUM text
Zohocorp Manageengine Servicedesk Plus - XSS
Default installations of Zoho ManageEngine ServiceDesk Plus 10.0 before 10500 are vulnerable to XSS injected by a workstation local administrator. Using the installed program names of the computer as a vector, the local administrator can execute code on the Manage Engine ServiceDesk administrator side. At "Asset Home > Server > <workstation> > software" the administrator of ManageEngine can control what software is installed on the workstation. This table shows all the installed program names in the Software column. In this field, a remote attacker can inject malicious code in order to execute it when the ManageEngine administrator visualizes this page.
by Felipe Molina
CVSS 6.1
EIP-2026-117019 EXPLOITDB python
Dameware Remote Support 12.1.1.273 - Buffer Overflow (SEH)
by gurbanli
EIP-2026-106624 EXPLOITDB text
E-Commerce System 1.0 - Unauthenticated Remote Code Execution
by SunCSR
EIP-2026-106104 EXPLOITDB python
Complaint Management System 1.0 - 'username' SQL Injection
by Daniel Ortiz
EIP-2026-101892 EXPLOITDB text
Netlink XPON 1GE WiFi V2801RGW - Remote Command Execution
by Seecko Das
CVE-2020-37074 EXPLOITDB CRITICAL python
Remote Desktop Audit 2.3.0.157 - RCE
Remote Desktop Audit 2.3.0.157 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code during the Add Computers Wizard file import process. Attackers can craft a malicious payload file to trigger a structured exception handler (SEH) bypass and execute shellcode when importing computer lists.
by gurbanli
CVSS 9.8
CVE-2020-37014 EXPLOITDB MEDIUM text
Tryton 5.4 - XSS
Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.
by Vulnerability-Lab
CVSS 6.4
CVE-2020-37003 EXPLOITDB MEDIUM text
Sellacious eCommerce 4.6 - XSS
Sellacious eCommerce 4.6 contains a persistent cross-site scripting vulnerability in the Manage Your Addresses module that allows attackers to inject malicious scripts. Attackers can exploit multiple address input fields like full name, company, and address to execute persistent script code that can hijack user sessions and manipulate application modules.
by Vulnerability-Lab
CVSS 6.4
CVE-2020-37075 EXPLOITDB CRITICAL python
LanSend 3.2 - RCE
LanSend 3.2 contains a buffer overflow vulnerability in the Add Computers Wizard file import functionality that allows remote attackers to execute arbitrary code. Attackers can craft a malicious payload file to trigger a structured exception handler (SEH) overwrite and execute shellcode when importing computers from a file.
by gurbanli
CVSS 9.8
CVE-2020-37019 EXPLOITDB MEDIUM text
Orchard Core RC1 - XSS
Orchard Core RC1 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious scripts through blog post creation. Attackers can create blog posts with embedded JavaScript in the MarkdownBodyPart.Source parameter to execute arbitrary scripts in victim browsers.
by SunCSR
CVSS 6.4
CVE-2020-11530 EXPLOITDB CRITICAL text
Idangero Chop Slider - SQL Injection
A blind SQL injection vulnerability is present in Chop Slider 3, a WordPress plugin. The vulnerability is introduced in the id GET parameter supplied to get_script/index.php, and allows an attacker to execute arbitrary SQL queries in the context of the WP database user.
by SunCSR
CVSS 9.8
EIP-2026-111615 EXPLOITDB text
qdPM 9.1 - Arbitrary File Upload
by Besim
EIP-2026-106309 EXPLOITDB text
CuteNews 2.1.2 - Authenticated Arbitrary File Upload
by Nhat Ha
EIP-2026-103377 EXPLOITDB python
MacOS 320.whatis Script - Privilege Escalation
by Csaba Fitzl
CVE-2019-16112 EXPLOITDB HIGH python
TylerTech Eagle <2018.3.11 - RCE
TylerTech Eagle 2018.3.11 deserializes untrusted user input, resulting in remote code execution via a crafted Java object to the recorder/ServiceManager?service=tyler.empire.settings.SettingManager URI.
by Anthony Cole
CVSS 8.8
CVE-2019-15253 EXPLOITDB MEDIUM text
Cisco Catalyst Center < 1.3.0.6 - XSS
A vulnerability in the web-based management interface of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker needs administrator credentials. This vulnerability affects Cisco DNA Center Software releases earlier than 1.3.0.6 and 1.3.1.4.
by Dylan Garnaud
CVSS 4.8
CVE-2020-37076 EXPLOITDB HIGH text
Victor CMS 1.0 - SQL Injection
Victor CMS version 1.0 contains a SQL injection vulnerability in the 'post' parameter on post.php that allows remote attackers to manipulate database queries. Attackers can exploit this vulnerability by sending crafted UNION SELECT payloads to extract database information through boolean-based, error-based, and time-based injection techniques.
by BKpatron
CVSS 8.2
CVE-2020-37022 EXPLOITDB MEDIUM text
OpenZ ERP 3.6.60 - XSS
OpenZ ERP 3.6.60 contains a persistent cross-site scripting vulnerability in the Employee module's name and description parameters. Attackers can inject malicious scripts through POST requests to , enabling session hijacking and manipulation of application modules.
by Vulnerability-Lab
CVSS 6.4
CVE-2020-12608 EXPLOITDB HIGH text
SolarWinds MSP PME <1.1.15 - Code Execution
An issue was discovered in SolarWinds MSP PME (Patch Management Engine) Cache Service before 1.1.15 in the Advanced Monitoring Agent. There are insecure file permissions for %PROGRAMDATA%\SolarWinds MSP\SolarWinds.MSP.CacheService\config\. This can lead to code execution by changing the CacheService.xml SISServerURL parameter.
by Jens Regel
CVSS 7.8
EIP-2026-114050 EXPLOITDB python
WordPress Plugin Simple File List 4.2.2 - Remote Code Execution
by coiffeur
EIP-2026-111983 EXPLOITDB text
Sentrifugo CMS 3.2 - Persistent Cross-Site Scripting
by Vulnerability-Lab
EIP-2026-110054 EXPLOITDB text
Online AgroCulture Farm Management System 1.0 - 'uname' SQL Injection
by Tarun Sehgal
EIP-2026-106308 EXPLOITDB text
CuteNews 2.1.2 - Arbitrary File Deletion
by Besim
EIP-2026-106105 EXPLOITDB text
Complaint Management System 1.0 - Authentication Bypass
by BKpatron