Exploitdb Exploits

49,992 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-9593 EXPLOITDB MEDIUM text
ShoreTel Connect ONSITE <18.82.2000.0 - XSS
A reflected Cross-site scripting (XSS) vulnerability in ShoreTel Connect ONSITE 18.82.2000.0 allows remote attackers to inject arbitrary web script or HTML via the page parameter.
by Ramikan
CVSS 6.1
CVE-2019-10874 EXPLOITDB HIGH html
Bolt < 3.6.7 - CSRF
Cross Site Request Forgery (CSRF) in the bolt/upload File Upload feature in Bolt CMS 3.6.6 allows remote attackers to execute arbitrary code by uploading a JavaScript file to include executable extensions in the file/edit/config/config.yml configuration file.
by FelipeGaspar
CVSS 8.8
CVE-2018-1160 EXPLOITDB CRITICAL python VERIFIED
Netatalk <3.1.12 - RCE
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
by muts
CVSS 9.8
CVE-2019-10893 EXPLOITDB MEDIUM text
Centos-webpanel Centos Web Panel - XSS
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version) and 0.9.8.753 (Pro) is vulnerable to Stored/Persistent XSS for Admin Email fields on the "CWP Settings > "Edit Settings" screen. By changing the email ID to any XSS Payload and clicking on Save Changes, the XSS Payload will execute.
by DKM
CVSS 4.8
CVE-2019-0211 EXPLOITDB HIGH php
Apache HTTP Server < 2.4.38 - Use After Free
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
by cfreal
CVSS 7.8
CVE-2019-10273 EXPLOITDB MEDIUM text
Zohocorp Manageengine Servicedesk Plus - Authentication Bypass
Information leakage vulnerability in the /mc login page in ManageEngine ServiceDesk Plus 9.3 software allows authenticated users to enumerate active users. Due to a flaw within the way the authentication is handled, an attacker is able to login and verify any active account.
by Operat0r
CVSS 4.3
CVE-2019-10887 EXPLOITDB MEDIUM text
Salicru Slc-20-cube3(5) - XSS
A reflected HTML injection vulnerability on Salicru SLC-20-cube3(5) devices running firmware version cs121-SNMP v4.54.82.130611 allows remote attackers to inject arbitrary HTML elements via a /DataLog.csv?log= or /AlarmLog.csv?log= or /waitlog.cgi?name= or /chart.shtml?data= or /createlog.cgi?name= request.
by Ramikan
CVSS 6.1
CVE-2019-25629 EXPLOITDB HIGH python
AIDA64 Extreme 5.99.4900 SEH Buffer Overflow via Logging
AIDA64 Extreme 5.99.4900 contains a structured exception handler buffer overflow vulnerability in the logging functionality that allows local attackers to execute arbitrary code by supplying a malicious CSV log file path. Attackers can inject shellcode through the Hardware Monitoring logging preferences to overflow the buffer and trigger code execution when the application processes the log file path.
by Peyman Forouzan
CVSS 8.4
CVE-2019-8942 EXPLOITDB HIGH ruby VERIFIED
Wordpress < 4.9.9 - Unrestricted File Upload
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
by Metasploit
CVSS 8.8
EIP-2026-113647 EXPLOITDB html
WordPress Plugin Contact Form Maker 1.13.1 - Cross-Site Request Forgery
by Peyman Forouzan
CVE-2019-8943 EXPLOITDB MEDIUM ruby VERIFIED
Wordpress < 5.0.3 - Path Traversal
WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.
by Metasploit
CVSS 6.5
CVE-2019-10008 EXPLOITDB HIGH python
Zoho ManageEngine ServiceDesk 9.3 - Privilege Escalation
Zoho ManageEngine ServiceDesk 9.3 allows session hijacking and privilege escalation because an established guest session is automatically converted into an established administrator session when the guest user enters the administrator username, with an arbitrary incorrect password, in an mc/ login attempt within a different browser tab.
by Ata Hakçıl_ Melih Kaan Yıldız
CVSS 8.8
CVE-2019-25565 EXPLOITDB MEDIUM python
Magic Iso Maker 5.5 Buffer Overflow Denial of Service
Magic Iso Maker 5.5 build 281 contains a buffer overflow vulnerability in the Serial Code registration field that allows local attackers to crash the application by submitting an oversized input. Attackers can generate a file containing 5000 bytes of data, paste it into the Serial Code field during registration, and trigger a denial of service condition that crashes the application.
by Alejandra Sánchez
CVSS 6.2
CVE-2019-25506 EXPLOITDB HIGH python
FreeSMS 2.1.2 - SQL Injection
FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable password parameter in requests to /pages/crc_handler.php?method=login to authenticate as any known user and subsequently modify their password via the profile update function.
by Yilmaz Degirmenci
CVSS 8.2
CVE-2019-25647 EXPLOITDB HIGH python
PhreeBooks ERP 5.2.3 Remote Code Execution via Image Manager
PhreeBooks ERP 5.2.3 contains a remote code execution vulnerability in the image manager that allows authenticated attackers to upload and execute arbitrary PHP files by bypassing file extension controls. Attackers can upload malicious PHP files through the image manager endpoint and execute them to establish reverse shell connections and execute system commands.
by Metin Yunus Kandemir
CVSS 8.8
CVE-2019-25631 EXPLOITDB HIGH python
AIDA64 Business 5.99.4900 SEH Buffer Overflow via EggHunter
AIDA64 Business 5.99.4900 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode. Attackers can inject egg hunter shellcode through the SMTP display name field in preferences or report wizard functionality to trigger the overflow and execute code with application privileges.
by Peyman Forouzan
CVSS 8.4
CVE-2019-25630 EXPLOITDB HIGH text
PhreeBooks ERP 5.2.3 Arbitrary File Upload via Image Manager
PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Image Manager component that allows authenticated attackers to upload malicious files by submitting requests to the image upload endpoint. Attackers can upload PHP files through the imgFile parameter to the bizuno/image/manager endpoint and execute them via the bizunoFS.php script for remote code execution.
by Abdullah Çelebi
CVSS 8.8
CVE-2019-25481 EXPLOITDB HIGH text
iScripts ReserveLogic - SQL Injection
iScripts ReserveLogic contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the jqSearchDestination parameter. Attackers can send POST requests to the search endpoint with crafted SQL payloads to extract sensitive database information.
by Ahmet Ümit BAYRAM
CVSS 8.2
CVE-2019-25473 EXPLOITDB HIGH text
Clinic Pro - SQL Injection
Clinic Pro contains a SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the month parameter. Attackers can send POST requests to the monthly_expense_overview endpoint with crafted month values using boolean-based blind, time-based blind, or error-based SQL injection techniques to extract sensitive database information.
by Abdullah Çelebi
CVSS 7.1
CVE-2019-25507 EXPLOITDB HIGH text
Ashop Shopping Cart - SQL Injection
Ashop Shopping Cart Software contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'shop' parameter. Attackers can send GET requests to index.php with malicious 'shop' values using UNION-based SQL injection to extract sensitive database information.
by Ahmet Ümit BAYRAM
CVSS 8.2
CVE-2021-47904 EXPLOITDB HIGH python
PhreeBooks 5.2.3 - Authenticated RCE
PhreeBooks 5.2.3 contains an authenticated file upload vulnerability in the Image Manager that allows remote code execution. Attackers can upload a malicious PHP web shell by exploiting unrestricted file type uploads to gain command execution on the server.
by Metin Yunus Kandemir
CVSS 8.8
CVE-2019-1652 EXPLOITDB HIGH ruby VERIFIED
Cisco Rv320 Firmware < 1.4.2.22 - OS Command Injection
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
by Metasploit
CVSS 7.2
CVE-2019-10863 EXPLOITDB HIGH ruby
Combodo Teemip < 2.4.0 - Code Injection
A command injection vulnerability exists in TeemIp versions before 2.4.0. The new_config parameter of exec.php allows one to create a new PHP file with the exception of config information. The malicious PHP code sent is executed instantaneously and is not saved on the server.
by AkkuS
CVSS 7.2
EIP-2026-103913 EXPLOITDB html VERIFIED
Google Chrome 72.0.3626.96 / 74.0.3702.0 - 'JSPromise::TriggerPromiseReactions' Type Confusion
by Google Security Research
EIP-2026-103715 EXPLOITDB html VERIFIED
WebKitGTK+ - 'ThreadedCompositor' Race Condition
by Google Security Research