Exploitdb Exploits

49,983 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-25612 EXPLOITDB HIGH python
Admin Express 1.2.5.485 Local SEH Buffer Overflow via Folder Path
Admin Express 1.2.5.485 contains a local structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an alphanumeric encoded payload in the Folder Path field. Attackers can trigger the vulnerability through the System Compare feature by pasting a crafted buffer overflow payload into the left-hand side Folder Path field and clicking the scale icon to execute shellcode with application privileges.
by Connor McGarr
CVSS 7.8
CVE-2019-10685 EXPLOITDB MEDIUM text
Heidelberg Prinect Archiver - XSS
A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Heidelberg Prinect Archiver v2013 release 1.0.
by alt3kx
CVSS 6.1
CVE-2019-25503 EXPLOITDB HIGH text VERIFIED
PHPads 2.0 - SQL Injection
PHPads 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the bannerID parameter in click.php3. Attackers can submit crafted bannerID values using SQL comment syntax and functions like extractvalue to extract sensitive database information such as the current database name.
by felipe andrian
CVSS 7.1
CVE-2019-25366 EXPLOITDB HIGH text VERIFIED
microASP Portal+ CMS - SQL Injection
microASP Portal+ CMS contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the explode_tree parameter. Attackers can send crafted requests to pagina.phtml with SQL injection payloads using extractvalue and concat functions to extract sensitive database information like the current database name.
by felipe andrian
CVSS 8.2
CVE-2025-34078 EXPLOITDB HIGH text
NSClient++ <0.5.2.35 - Privilege Escalation
A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API. This behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions.
by bzyo
CVSS 7.8
EIP-2026-119321 EXPLOITDB python
Xitami Web Server 2.5 - Remote Buffer Overflow (SEH + Egghunter)
by ElSoufiane
CVE-2018-20580 EXPLOITDB HIGH text
Smartbear Readyapi - Improper Input Validation
The WSDL import functionality in SmartBear ReadyAPI 2.5.0 and 2.6.0 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.
by Gilson Camelo
CVSS 8.8
CVE-2019-7286 EXPLOITDB HIGH c
iOS <12.1.4 - Privilege Escalation
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. An application may be able to gain elevated privileges.
by ZecOps
CVSS 7.8
CVE-2018-17173 EXPLOITDB CRITICAL ruby
LG SuperSign CMS - RCE
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
by Alejandro Fanjul
CVSS 9.8
CVE-2025-34034 EXPLOITDB HIGH python
Blue Angel Software Suite - Info Disclosure
A hardcoded credential vulnerability exists in the Blue Angel Software Suite deployed on embedded Linux systems. The application contains multiple known default and hardcoded user accounts that are not disclosed in public documentation. These accounts allow unauthenticated or low-privilege attackers to gain administrative access to the device’s web interface. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-26 UTC.
by Paolo Serracino_ Pietro Minniti_ Damiano Proietti
CVSS 8.8
CVE-2025-34033 EXPLOITDB HIGH python
Blue Angel Software Suite - Command Injection
An OS command injection vulnerability exists in the Blue Angel Software Suite running on embedded Linux devices via the ping_addr parameter in the webctrl.cgi script. The application fails to properly sanitize input before passing it to the system-level ping command. An authenticated attacker can inject arbitrary commands by appending shell metacharacters to the ping_addr parameter in a crafted GET request to /cgi-bin/webctrl.cgi?action=pingtest_update. The command's output is reflected in the application's web interface, enabling attackers to view results directly. Default and backdoor credentials can be used to access the interface and exploit the issue. Successful exploitation results in arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-26 UTC.
by Paolo Serracino_ Pietro Minniti_ Damiano Proietti
CVSS 8.8
EIP-2026-118885 EXPLOITDB text VERIFIED
Microsoft Windows PowerShell ISE - Remote Code Execution
by hyp3rlinx
CVE-2019-9017 EXPLOITDB HIGH text
Solarwinds Dameware Mini Remote Control - Out-of-Bounds Write
DWRCC in SolarWinds DameWare Mini Remote Control 10.0 x64 has a Buffer Overflow associated with the size field for the machine name.
by Dino Barlattani
CVSS 7.5
CVE-2019-9978 EXPLOITDB MEDIUM python
Social Warfare <3.5.3 - Stored XSS
The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
by hash3liZer
CVSS 6.1
EIP-2026-107872 EXPLOITDB text
Instagram Auto Follow - Authentication Bypass
by Veyselxan
CVE-2019-11504 EXPLOITDB MEDIUM text
Zotonic <0.47 - XSS
Zotonic before version 0.47 has mod_admin XSS.
by Ramòn Janssen
CVSS 4.8
CVE-2019-3929 EXPLOITDB CRITICAL text
Crestron Am-100 Firmware < 2.4.1.19 - OS Command Injection
The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.
by Jacob Baines
CVSS 9.8
CVE-2019-5420 EXPLOITDB CRITICAL ruby VERIFIED
Ruby On Rails DoubleTap Development Mode secret_key_base Vulnerability
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
by Metasploit
CVSS 9.8
CVE-2019-11429 EXPLOITDB MEDIUM text
CentOS-WebPanel.com <0.9.8.793,0.9.8.753,0.9.8.807 - XSS
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version), 0.9.8.753 (Pro) and 0.9.8.807 (Pro) is vulnerable to Reflected XSS for the "Domain" field on the "DNS Functions > "Add DNS Zone" screen.
by DKM
CVSS 4.8
CVE-2019-25614 EXPLOITDB CRITICAL python
Free Float FTP 1.0 STOR Command Remote Buffer Overflow
Free Float FTP 1.0 contains a buffer overflow vulnerability in the STOR command handler that allows remote attackers to execute arbitrary code by sending a crafted STOR request with an oversized payload. Attackers can authenticate with anonymous credentials and send a malicious STOR command containing 247 bytes of padding followed by a return address and shellcode to trigger code execution on the FTP server.
by Kevin Randall
CVSS 9.8
CVE-2019-25596 EXPLOITDB MEDIUM python
SpotAuditor 5.2.6 Name Field Denial of Service
SpotAuditor 5.2.6 contains a denial of service vulnerability in the registration dialog that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can paste a buffer of 300 repeated characters into the Name input during registration to trigger an application crash.
by Victor Mondragón
CVSS 6.2
CVE-2019-17600 EXPLOITDB CRITICAL html
Intelbras Iwr 1000n Firmware - CSRF
Intelbras IWR 1000N 1.6.4 devices allow disclosure of the administrator login name and password because v1/system/user is mishandled.
by Social Engineering Neo
CVSS 9.8
CVE-2019-10664 EXPLOITDB CRITICAL python VERIFIED
Domoticz < 4.10578 - SQL Injection
Domoticz before 4.10578 allows SQL Injection via the idx parameter in CWebServer::GetFloorplanImage in WebServer.cpp.
by Fabio Carretto
CVSS 9.8
CVE-2019-14298 EXPLOITDB MEDIUM text
Veeam ONE Reporter <9.5.0.3201 - XSS
Veeam ONE Reporter 9.5.0.3201 allows XSS via a crafted Description(config) field to addDashboard or editDashboard in CommonDataHandlerReadOnly.ashx.
by Seyed Sadegh Khatami
CVSS 5.4
CVE-2019-14297 EXPLOITDB MEDIUM text
Veeam ONE Reporter <9.5.0.3201 - XSS
Veeam ONE Reporter 9.5.0.3201 allows XSS via the Add/Edit Widget with a crafted Caption field to setDashboardWidget in CommonDataHandlerReadOnly.ashx.
by Seyed Sadegh Khatami
CVSS 5.4