Exploitdb Exploits

49,983 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-104218 EXPLOITDB html
CyberPanel 1.8.4 - Cross-Site Request Forgery
by Bilgi Birikim Sistemleri
EIP-2026-103158 EXPLOITDB ruby
Linux Mint 18.3-19.1 - 'yelp' Command Injection (Metasploit)
by b1ack0wl
CVE-2018-20434 EXPLOITDB CRITICAL python VERIFIED
Librenms - OS Command Injection
LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.
by Askar
CVSS 9.8
CVE-2019-11707 EXPLOITDB HIGH text VERIFIED
Mozilla Firefox < 60.7.1 - Type Confusion
A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2.
by Google Security Research
CVSS 8.8
CVE-2018-15710 EXPLOITDB HIGH ruby VERIFIED
Nagios XI - OS Command Injection
Nagios XI 5.5.6 allows local authenticated attackers to escalate privileges to root via Autodiscover_new.php.
by Metasploit
CVSS 7.8
CVE-2019-25487 EXPLOITDB CRITICAL python
SAPIDO RB-1732 V2.0.43 - RCE
SAPIDO RB-1732 V2.0.43 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the formSysCmd endpoint. Attackers can send POST requests with the sysCmd parameter containing shell commands to execute code on the device with router privileges.
by k1nm3n.aotoi
CVSS 9.8
CVE-2019-13131 EXPLOITDB CRITICAL python
Supermicro Superdoctor 5 - Missing Authentication
Super Micro SuperDoctor 5, when restrictions are not implemented in agent.cfg, allows remote attackers to execute arbitrary commands via NRPE.
by Simon Gurney
CVSS 9.8
CVE-2019-13507 EXPLOITDB CRITICAL text
Hidea AZ Admin - SQL Injection
hidea.com AZ Admin 1.0 has news_det.php?cod= SQL Injection.
by felipe andrian
CVSS 9.8
EIP-2026-113871 EXPLOITDB text
WordPress Plugin Live Chat Unlimited 2.8.3 - Cross-Site Scripting
by m0ze
EIP-2026-113821 EXPLOITDB text
WordPress Plugin iLive 1.0.4 - Cross-Site Scripting
by m0ze
EIP-2026-101747 EXPLOITDB html
Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution
by XORcat
EIP-2026-100643 EXPLOITDB python
BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal
by Aaron Bishop
CVE-2019-25602 EXPLOITDB MEDIUM text
GSearch 1.0.1.0 Denial of Service via Search Input
GSearch 1.0.1.0 contains a denial of service vulnerability that allows local attackers to crash the application by inputting an excessively long string in the search bar. Attackers can paste a buffer of 2000 characters into the search field, click search, and select any result to trigger an application crash.
by 0xB9
CVSS 5.5
CVE-2019-0943 EXPLOITDB HIGH text VERIFIED
Windows - Privilege Escalation
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC.
by Google Security Research
CVSS 7.8
CVE-2019-0959 EXPLOITDB HIGH text VERIFIED
Windows Common Log File System - Privilege Escalation
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
by Google Security Research
CVSS 7.0
CVE-2019-12744 EXPLOITDB HIGH text
Seeddms < 5.1.11 - Unrestricted File Upload
SeedDMS before 5.1.11 allows Remote Command Execution (RCE) because of unvalidated file upload of PHP scripts, a different vulnerability than CVE-2018-12940.
by Nimit Jain
CVSS 7.5
CVE-2019-12745 EXPLOITDB MEDIUM text
Seeddms < 5.1.11 - XSS
out/out.UsrMgr.php in SeedDMS before 5.1.11 allows Stored Cross-Site Scripting (XSS) via the name field.
by Nimit Jain
CVSS 5.4
CVE-2019-12801 EXPLOITDB MEDIUM text
Seeddms - XSS
out/out.GroupMgr.php in SeedDMS 5.1.11 has Stored XSS by making a new group with a JavaScript payload as the "GROUP" Name.
by Nimit Jain
CVSS 6.1
CVE-2019-11354 EXPLOITDB HIGH text
Origin 10.5.36 - RCE
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.
by Metin Yunus Kandemir
CVSS 7.8
CVE-2019-12276 EXPLOITDB HIGH python
GrandNode 4.40 - Path Traversal
A Path Traversal vulnerability in Controllers/LetsEncryptController.cs in LetsEncryptController in GrandNode 4.40 allows remote, unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests. A patch for this issue was made on 2019-05-30 in GrandNode 4.40.
by Corey Robinson
CVSS 7.5
CVE-2019-12828 EXPLOITDB HIGH text
Electronic Arts Origin <10.5.39 - Code Injection
An issue was discovered in Electronic Arts Origin before 10.5.39. Due to improper sanitization of the origin:// and origin2:// URI schemes, it is possible to inject additional arguments into the Origin process and ultimately leverage code execution by loading a backdoored Qt plugin remotely via the platformpluginpath argument supplied with a Windows network share.
by Dominik Penner
CVSS 8.8
CVE-2019-25603 EXPLOITDB HIGH python
TuneClone 2.20 Structured Exception Handler Buffer Overflow
TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious license code string. Attackers can craft a payload with a controlled buffer, NSEH jump instruction, and SEH handler address pointing to a ROP gadget, then paste it into the license code field to trigger code execution and establish a bind shell.
by Achilles
CVSS 8.4
CVE-2019-13292 EXPLOITDB CRITICAL python
Weberp - SQL Injection
A SQL Injection issue was discovered in webERP 4.15. Payments.php accepts payment data in base64 format. After this is decoded, it is deserialized. Then, this deserialized data goes directly into a SQL query, with no sanitizing checks.
by Semen Alexandrovich Lyhin
CVSS 9.8
CVE-2019-1821 EXPLOITDB HIGH ruby VERIFIED
Cisco Prime Infrastructure/EPN Manager - RCE
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
by Metasploit
CVSS 8.8
EIP-2026-102804 EXPLOITDB ruby VERIFIED
Cisco Prime Infrastructure - Runrshell Privilege Escalation (Metasploit)
by Metasploit