Exploitdb Exploits

49,983 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-16662 EXPLOITDB CRITICAL ruby VERIFIED
rConfig <3.9.2 - Command Injection
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
by Metasploit
CVSS 9.8
CVE-2019-10475 EXPLOITDB MEDIUM python
Jenkins Build-metrics < 1.3 - XSS
A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin.
by vesche
CVSS 6.1
CVE-2017-13156 EXPLOITDB HIGH ruby VERIFIED
Android Janus APK Signature bypass
An elevation of privilege vulnerability in the Android system (art). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-64211847.
by Metasploit
CVSS 7.8
CVE-2019-25287 EXPLOITDB HIGH text
Adaware Web Companion 4.8.2078.3950 - Code Injection
Adaware Web Companion version 4.8.2078.3950 contains an unquoted service path vulnerability in the WCAssistantService that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\Lavasoft\Web Companion\Application\ to inject malicious code that would execute with LocalSystem privileges during service startup.
by Mariela L Martínez Hdez
CVSS 7.8
CVE-2019-25288 EXPLOITDB HIGH text
Wacom WTabletService 6.6.7-3 - Code Injection
Wacom WTabletService 6.6.7-3 contains an unquoted service path vulnerability that allows local attackers to execute malicious code with elevated privileges. Attackers can insert an executable file in the service path to run unauthorized code when the service restarts or the system reboots.
by Marcos Antonio León
CVSS 7.8
CVE-2020-21997 EXPLOITDB HIGH bash
Smartwares Home Easy Firmware < 1.0.9 - Missing Authentication
Smartwares HOME easy <=1.0.9 is vulnerable to an unauthenticated database backup download and information disclosure vulnerability. An attacker could disclose sensitive and clear-text information resulting in authentication bypass, session hijacking and full system control.
by LiquidWorm
CVSS 7.5
CVE-2019-25235 EXPLOITDB CRITICAL text
Smartwares HOME easy <1.0.9 - Auth Bypass
Smartwares HOME easy 1.0.9 contains an authentication bypass vulnerability that allows unauthenticated attackers to access administrative web pages by disabling JavaScript. Attackers can navigate to multiple administrative endpoints and to bypass client-side validation and access sensitive system information.
by LiquidWorm
CVSS 9.8
EIP-2026-117805 EXPLOITDB text
QNAP NetBak Replicator 4.5.6.0607 - 'QVssService' Unquoted Service Path
by Ivan Marmolejo
CVE-2019-25359 EXPLOITDB HIGH text
SD.NET RIM <4.7.3c - SQL Injection
SD.NET RIM versions before 4.7.3c contain a SQL injection vulnerability that allows attackers to inject malicious SQL statements through POST parameters 'idtyp' and 'idgremium'. Attackers can exploit this vulnerability by crafting specially formed POST requests to the /vorlagen/ endpoint, enabling unauthorized database manipulation and potential information disclosure.
by Fabian Mosch_ Nick Theisinger
CVSS 8.2
CVE-2019-25358 EXPLOITDB HIGH python
FileOptimizer 14.00.2524 - DoS
FileOptimizer 14.00.2524 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the FileOptimizer32.ini configuration file. Attackers can overwrite the TempDirectory parameter with a 5000-character buffer to cause the application to crash when opening options.
by SYANiDE
CVSS 7.5
CVE-2019-25301 EXPLOITDB MEDIUM text
Millhouse-Project 1.414 - XSS
Millhouse-Project 1.414 contains a persistent cross-site scripting vulnerability in the comment submission functionality that allows attackers to inject malicious scripts. Attackers can post comments with embedded JavaScript through the 'content' parameter in add_comment_sql.php to execute arbitrary scripts in victim browsers.
by cakes
CVSS 6.4
CVE-2019-25300 EXPLOITDB HIGH text
Globitek CMS 1.4 - SQL Injection
thejshen Globitek CMS 1.4 contains a SQL injection vulnerability that allows attackers to manipulate database queries through the 'id' GET parameter. Attackers can exploit boolean-based, time-based, and UNION-based SQL injection techniques to potentially extract or modify database information.
by cakes
CVSS 7.1
CVE-2019-25299 EXPLOITDB HIGH text
RimbaLinux AhadPOS 1.11 - SQL Injection
RimbaLinux AhadPOS 1.11 contains a SQL injection vulnerability in the 'alamatCustomer' parameter that allows attackers to manipulate database queries through crafted POST requests. Attackers can exploit time-based and boolean-based blind SQL injection techniques to extract information or potentially interact with the underlying database.
by cakes
CVSS 7.1
CVE-2019-25298 EXPLOITDB CRITICAL text
html5_snmp 1.11 - SQL Injection
html5_snmp 1.11 contains multiple SQL injection vulnerabilities that allow attackers to manipulate database queries through Router_ID and Router_IP parameters. Attackers can exploit error-based, time-based, and union-based injection techniques to potentially extract or modify database information by sending crafted payloads.
by cakes
CVSS 9.1
CVE-2019-25294 EXPLOITDB MEDIUM text
html5_snmp 1.11 - XSS
html5_snmp 1.11 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts through the 'Remark' parameter in add_router_operation.php. Attackers can craft a POST request with a script payload in the Remark field to execute arbitrary JavaScript in victim browsers when the page is loaded.
by cakes
CVSS 6.1
CVE-2019-25293 EXPLOITDB HIGH text
BlueStacks App Player 2.4.44.62.57 - Local Privilege Escalation
BlueStacks App Player 2.4.44.62.57 contains an unquoted service path vulnerability in the BstHdLogRotatorSvc service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:\Program Files (x86)\Bluestacks\HD-LogRotatorService.exe to inject malicious executables and escalate privileges.
by Diego Armando Buztamante Rico
CVSS 7.8
EIP-2026-117688 EXPLOITDB text
Network Inventory Advisor 5.0.26.0 - 'niaservice' Unquoted Service Path
by Samuel DiazL
EIP-2026-103707 EXPLOITDB text VERIFIED
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive
by Google Security Research
CVE-2019-8820 EXPLOITDB HIGH text VERIFIED
Apple Icloud < 7.15 - Out-of-Bounds Write
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
by Google Security Research
CVSS 8.8
EIP-2026-103367 EXPLOITDB text VERIFIED
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common()
by Google Security Research
CVE-2019-25361 EXPLOITDB CRITICAL python
Ayukov NFTP 1.71 - Buffer Overflow
Ayukov NFTP client 1.71 contains a buffer overflow vulnerability in the SYST command handling that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted SYST command with oversized payload to trigger a buffer overflow and execute a bind shell on port 5150.
by SYANiDE
CVSS 9.8
CVE-2019-25360 EXPLOITDB CRITICAL python
Aida64 Engineer 6.10.5200 - Buffer Overflow
Aida64 Engineer 6.10.5200 contains a buffer overflow vulnerability in the CSV logging configuration that allows attackers to execute malicious code by crafting a specially designed payload. Attackers can exploit the vulnerability by creating a malformed log file with carefully constructed SEH (Structured Exception Handler) overwrite techniques to achieve remote code execution.
by daejinoh
CVSS 9.8
CVE-2019-25302 EXPLOITDB HIGH text
Acer Launch Manager 6.1.7600.16385 - Privilege Escalation
Acer Launch Manager 6.1.7600.16385 contains an unquoted service path vulnerability in the DsiWMIService that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\Launch Manager\dsiwmis.exe to insert malicious code that would execute with system-level permissions during service startup.
by Gustavo Briseño
CVSS 7.8
EIP-2026-117723 EXPLOITDB text
OpenVPN Connect 3.0.0.272 - 'agent_ovpnconnect' Unquoted Service Path
by Luis Martínez
EIP-2026-103363 EXPLOITDB c
Apple macOS 10.15.1 - Denial of Service (PoC)
by 08Tc3wBB