Exploitdb Exploits

49,983 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-8017 EXPLOITDB CRITICAL text VERIFIED
Adobe Acrobat DC < 15.006.30499 - Memory Corruption
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution .
by Google Security Research
CVSS 9.8
CVE-2019-8663 EXPLOITDB MEDIUM text VERIFIED
iOS <12.4 - Info Disclosure
This issue was addressed with improved checks. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6. A remote attacker may be able to leak memory.
by Google Security Research
CVSS 5.3
CVE-2019-14422 EXPLOITDB HIGH text
TortoiseSVN 1.12.1 - RCE
An issue was discovered in in TortoiseSVN 1.12.1. The Tsvncmd: URI handler allows a customised diff operation on Excel workbooks, which could be used to open remote workbooks without protection from macro security settings to execute arbitrary code. A tsvncmd:command:diff?path:[file1]?path2:[file2] URI will execute a customised diff on [file1] and [file2] based on the file extension. For xls files, it will execute the script diff-xls.js using wscript, which will open the two files for analysis without any macro security warning. An attacker can exploit this by putting a macro virus in a network drive, and force the victim to open the workbooks and execute the macro inside.
by Vulnerability-Lab
CVSS 8.8
EIP-2026-119396 EXPLOITDB python
ManageEngine opManager 12.3.150 - Authenticated Code Execution
by kindredsec
EIP-2026-117556 EXPLOITDB c++
Microsoft Windows 10 AppXSvc Deployment Service - Arbitrary File Deletion
by Abdelhamid Naceri
EIP-2026-115815 EXPLOITDB python VERIFIED
Microsoft Windows PowerShell - Unsanitized Filename Command Execution
by hyp3rlinx
EIP-2026-113688 EXPLOITDB text
WordPress Plugin Download Manager 2.5 - Cross-Site Request Forgery
by Princy Edward
CVE-2019-14974 EXPLOITDB MEDIUM text
Sugarcrm - XSS
SugarCRM Enterprise 9.0.0 allows mobile/error-not-supported-platform.html?desktop_url= XSS.
by Ilca Lucian Florin
CVSS 6.1
EIP-2026-108758 EXPLOITDB text
Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'customfields.php' SQL Injection
by qw3rTyTy
EIP-2026-104709 EXPLOITDB ruby
Agent Tesla Botnet - Arbitrary Code Execution (Metasploit)
by Ege Balci
EIP-2026-102550 EXPLOITDB text
ABC2MTEX 1.6.1 - Command Line Stack Overflow
by Carter Yagemann
CVE-2019-13101 EXPLOITDB CRITICAL ruby
Dlink Dir-600m Firmware - Missing Authentication
An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
by Devendra Singh Solanki
CVSS 9.8
EIP-2026-104714 EXPLOITDB python
AZORult Botnet - SQL Injection
by prsecurity
EIP-2026-104708 EXPLOITDB python
Agent Tesla Botnet - Arbitrary Code Execution
by prsecurity
EIP-2026-117961 EXPLOITDB powershell
Steam Windows Client - Local Privilege Escalation
by AbsoZed
CVE-2019-12255 EXPLOITDB CRITICAL python
Wind River VxWorks - Buffer Overflow
Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow.
by Zhou Yu
CVSS 9.8
CVE-2019-14804 EXPLOITDB MEDIUM text
Una - XSS
studio/polyglot.php?page=etemplates in UNA 10.0.0-RC1 allows XSS via the System Name field under Emails during template editing.
by Greg.Priest
CVSS 4.8
CVE-2019-14748 EXPLOITDB MEDIUM text VERIFIED
Osticket < 1.10.7 - XSS
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment.
by Aishwarya Iyer
CVSS 5.4
CVE-2019-14750 EXPLOITDB MEDIUM text VERIFIED
Osticket < 1.10.7 - XSS
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions.
by Aishwarya Iyer
CVSS 6.1
CVE-2019-14749 EXPLOITDB HIGH text VERIFIED
osTicket <1.10.7, <1.12.1 - Code Injection
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. CSV (aka Formula) injection exists in the export spreadsheets functionality. These spreadsheets are generated dynamically from unvalidated or unfiltered user input in the Name and Internal Notes fields in the Users tab, and the Issue Summary field in the tickets tab. This allows other agents to download data in a .csv file format or .xls file format. This is used as input for spreadsheet applications such as Excel and OpenOffice Calc, resulting in a situation where cells in the spreadsheets can contain input from an untrusted source. As a result, the end user who is accessing the exported spreadsheet can be affected.
by Aishwarya Iyer
CVSS 8.8
CVE-2019-14931 EXPLOITDB CRITICAL python
Mitsubishielectric Smartrtu Firmware < 2.02 - OS Command Injection
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote OS Command Injection vulnerability allows an attacker to execute arbitrary commands on the RTU due to the passing of unsafe user supplied data to the RTU's system shell. Functionality in mobile.php provides users with the ability to ping sites or IP addresses via Mobile Connection Test. When the Mobile Connection Test is submitted, action.php is called to execute the test. An attacker can use a shell command separator (;) in the host variable to execute operating system commands upon submitting the test data.
by xerubus
CVSS 9.8
CVE-2019-14927 EXPLOITDB HIGH python
Mitsubishielectric Smartrtu Firmware < 2.02 - Missing Authentication
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote configuration download vulnerability allows an attacker to download the smartRTU's configuration file (which contains data such as usernames, passwords, and other sensitive RTU data).
by xerubus
CVSS 7.5
EIP-2026-108763 EXPLOITDB text
Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection
by qw3rTyTy
EIP-2026-108762 EXPLOITDB text
Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion
by qw3rTyTy
EIP-2026-108757 EXPLOITDB text
Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'cities.php' SQL Injection
by qw3rTyTy