Exploitdb Exploits

49,983 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-114028 EXPLOITDB text
WordPress Plugin Sell Downloads 1.0.86 - Cross-Site Scripting
by Mr Winst0n
EIP-2026-113505 EXPLOITDB perl
WordPress Core 5.2.3 - Cross-Site Host Modification
by Todor Donev
EIP-2026-110056 EXPLOITDB text
Online Appointment - SQL Injection
by mohammad zaheri
CVE-2019-16065 EXPLOITDB HIGH text
Enigma NMS 65.0.0 - SQL Injection
A remote SQL injection web vulnerability was discovered in the Enigma NMS 65.0.0 and prior web application that allows an attacker to execute SQL commands to expose and compromise the web server, expose database tables and values, and potentially execute system-based commands as the mysql user. This affects the search_pattern value of the manage_hosts_short.cgi script.
by xerubus
CVSS 8.8
CVE-2019-16072 EXPLOITDB CRITICAL python
NETSAS Enigma NMS <65.0.0 - Command Injection
An OS command injection vulnerability in the discover_and_manage CGI script in NETSAS Enigma NMS 65.0.0 and prior allows an attacker to execute arbitrary code because of improper neutralization of shell metacharacters in the ip_address variable within an snmp_browser action.
by xerubus
CVSS 9.8
CVE-2019-16068 EXPLOITDB HIGH html
NETSAS ENIGMA NMS <65.0.0 - CSRF
A CSRF vulnerability exists in NETSAS ENIGMA NMS version 65.0.0 and prior that could allow an attacker to be able to trick a victim into submitting a malicious manage_files.cgi request. This can be triggered via XSS or an IFRAME tag included within the site.
by xerubus
CVSS 8.8
CVE-2019-25443 EXPLOITDB HIGH text
Inventory Webapp - SQL Injection
Inventory Webapp contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through GET parameters. Attackers can supply malicious SQL payloads in the name, description, quantity, or cat_id parameters to add-item.php to execute arbitrary database commands.
by mohammad zaheri
CVSS 8.2
EIP-2026-117577 EXPLOITDB python
Microsoft Windows NTFS - Privileged File Access Enumeration
by hyp3rlinx
EIP-2026-111577 EXPLOITDB text
Publisure Hybrid - Multiple Vulnerabilities
by Jean-Marie Bourbon
CVE-2019-11539 EXPLOITDB HIGH python
Pulse Secure <9.0R3.4-5.1R15.1 - Authenticated Command Injection
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.
by Justin Wagner
CVSS 7.2
CVE-2019-15029 EXPLOITDB HIGH python
Fusionpbx - OS Command Injection
FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.
by Askar
CVSS 8.8
CVE-2017-16709 EXPLOITDB HIGH ruby VERIFIED
Crestron Airmedia <1.6.0, <2.7.0 - RCE
Crestron Airmedia AM-100 devices with firmware before 1.6.0 and AM-101 devices with firmware before 2.7.0 allows remote authenticated administrators to execute arbitrary code via unspecified vectors.
by Metasploit
CVSS 7.2
CVE-2019-15889 EXPLOITDB MEDIUM text
WordPress <2.9.94 - XSS
The download-manager plugin before 2.9.94 for WordPress has XSS via the category shortcode feature, as demonstrated by the orderby or search[publish_date] parameter.
by MgThuraMoeMyint
CVSS 6.1
CVE-2019-10677 EXPLOITDB MEDIUM text
Dasanzhone Znid Gpon 2426a EU Firmware < s3.1.285 - XSS
Multiple Cross-Site Scripting (XSS) issues in the web interface on DASAN Zhone ZNID GPON 2426A EU version S3.1.285 devices allow a remote attacker to execute arbitrary JavaScript via manipulation of an unsanitized GET parameter: /zhndnsdisplay.cmd (name), /wlsecrefresh.wl (wlWscCfgMethod, wl_wsc_reg).
by Adam Ziaja
CVSS 6.1
CVE-2019-25471 EXPLOITDB CRITICAL text VERIFIED
FileThingie 2.5.7 - Arbitrary File Upload
FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files containing PHP shells, use the unzip functionality to extract them into accessible directories, and execute arbitrary commands through the extracted PHP files.
by cakes
CVSS 9.8
CVE-2019-1935 EXPLOITDB CRITICAL ruby VERIFIED
Cisco Integrated Management Controlle... - Hard-coded Credentials
A vulnerability in Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to log in to the CLI of an affected system by using the SCP User account (scpuser), which has default user credentials. The vulnerability is due to the presence of a documented default account with an undocumented default password and incorrect permission settings for that account. Changing the default password for this account is not enforced during the installation of the product. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the scpuser account. This includes full read and write access to the system's database.
by Metasploit
CVSS 9.8
EIP-2026-102959 EXPLOITDB ruby VERIFIED
ptrace - Sudo Token Privilege Escalation (Metasploit)
by Metasploit
EIP-2026-102958 EXPLOITDB ruby VERIFIED
ptrace - Sudo Token Privilege Escalation (Metasploit)
by Metasploit
CVE-2011-2921 EXPLOITDB CRITICAL ruby VERIFIED
ktsuss suid Privilege Escalation
ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges.
by Metasploit
CVSS 9.8
CVE-2019-1622 EXPLOITDB MEDIUM ruby VERIFIED
Cisco Data Center Network Manager Unauthenticated Remote Code Execution
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. The vulnerability is due to improper access controls for certain URLs on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download log files and diagnostic information from the affected device.
by Metasploit
CVSS 5.3
CVE-2019-1663 EXPLOITDB CRITICAL ruby VERIFIED
Cisco Rv110w Firmware < 1.2.2.1 - Out-of-Bounds Write
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected.
by Metasploit
CVSS 9.8
CVE-2019-25472 EXPLOITDB HIGH perl
IntelBras TIP200/TIP200 LITE - Info Disclosure
IntelBras Telefone IP TIP200 and 200 LITE contain an unauthenticated arbitrary file read vulnerability in the dumpConfigFile function accessible via the cgiServer.exx endpoint. Attackers can send GET requests to /cgi-bin/cgiServer.exx with the command parameter containing dumpConfigFile() to read sensitive files including /etc/shadow and configuration files without proper authorization.
by Todor Donev
CVSS 7.5
CVE-2019-16120 EXPLOITDB HIGH text
WordPress Event Tickets <4.10.7.2 - Code Injection
CSV injection in the event-tickets (Event Tickets) plugin before 4.10.7.2 for WordPress exists via the "All Post> Ticketed > Attendees" Export Attendees feature.
by MTK
CVSS 8.8
EIP-2026-117516 EXPLOITDB python
Microsoft Windows - 'WSReset' UAC Protection Bypass (Registry)
by valen
EIP-2026-117372 EXPLOITDB text
Kaseya VSA agent 9.5 - Privilege Escalation
by NF