Exploitdb Exploits

49,989 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-25682 EXPLOITDB MEDIUM text
CMSsite 1.0 Cross-Site Request Forgery via users.php
CMSsite 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious HTML forms. Attackers can trick authenticated administrators into visiting crafted pages that submit POST requests to the users.php endpoint with parameters like source=add_user, source=edit_user, or del=1 to create, modify, or delete admin accounts.
by Mr Winst0n
CVSS 4.3
CVE-2019-9182 EXPLOITDB HIGH text
Zzzcms Zzzphp - CSRF
There is a CSRF in ZZZCMS zzzphp V1.6.1 via a /admin015/save.php?act=editfile request. It allows PHP code injection by providing a filename in the file parameter, and providing file content in the filetext parameter.
by Yang Chenglong
CVSS 8.8
EIP-2026-119438 EXPLOITDB python
Splunk Enterprise 7.2.4 - Custom App Remote Command Execution (Persistent Backdoor / Custom Binary)
by Matteo Malvica
CVE-2019-7751 EXPLOITDB HIGH python
Ricoh MarcomCentral - Path Traversal
A directory traversal and local file inclusion vulnerability in FPProducerInternetServer.exe in Ricoh MarcomCentral, formerly PTI Marketing, FusionPro VDP before 10.0 allows a remote attacker to list or enumerate sensitive contents of files. Furthermore, this could allow for privilege escalation by dumping the local machine's SAM and SYSTEM database files, and possibly remote code execution.
by 0v3rride
CVSS 7.5
CVE-2019-0539 EXPLOITDB HIGH html
Microsoft Chakracore < 1.11.5 - Out-of-Bounds Write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0567, CVE-2019-0568.
by Fahad Aid Alharbi
CVSS 7.5
CVE-2019-9082 EXPLOITDB HIGH text
Thinkphp < 3.2.4 - Missing Authentication
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
by Yang Chenglong
CVSS 8.8
EIP-2026-113624 EXPLOITDB text
WordPress Plugin Cerber Security_ Antispam & Malware Scan 8.0 - Multiple Bypass Vulnerabilities
by ed0x21son
EIP-2026-110214 EXPLOITDB text
OOP CMS BLOG 1.0 - Multiple SQL Injection
by Mr Winst0n
EIP-2026-110213 EXPLOITDB text
OOP CMS BLOG 1.0 - Multiple Cross-Site Request Forgery
by Mr Winst0n
CVE-2019-9194 EXPLOITDB CRITICAL python VERIFIED
Std42 Elfinder < 2.1.48 - OS Command Injection
elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.
by q3rv0
CVSS 9.8
CVE-2019-9554 EXPLOITDB MEDIUM text
Craft CMS 3.1.12 Pro - XSS
In the 3.1.12 Pro version of Craft CMS, XSS has been discovered in the header insertion field when adding source code at an s/admin/entries/news/new URI.
by Ismail Tasdelen
CVSS 6.1
CVE-2019-9581 EXPLOITDB HIGH ruby
phpscheduleit Booked Scheduler <2.7.5 - RCE
phpscheduleit Booked Scheduler 2.7.5 allows arbitrary file upload via the Favicon field, leading to execution of arbitrary Web/custom-favicon.php PHP code, because Presenters/Admin/ManageThemePresenter.php does not ensure an image file extension.
by AkkuS
CVSS 8.8
CVE-2019-9553 EXPLOITDB MEDIUM text
Bolt 3.6.4 - XSS
Bolt 3.6.4 has XSS via the slug, teaser, or title parameter to editcontent/pages, a related issue to CVE-2017-11128 and CVE-2018-19933.
by Ismail Tasdelen
CVSS 6.1
CVE-2019-7385 EXPLOITDB HIGH text
Raisecom ISCOM HT803G-U/-W/-1GE/GPON <2.0.0_140521_R4.1.47.002 - Co...
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device.
by JameelNabbo
CVSS 7.8
CVE-2019-9556 EXPLOITDB MEDIUM text
FiberHome an5506-04-f RP2669 - XSS
FiberHome an5506-04-f RP2669 devices have XSS.
by Tauco
CVSS 5.4
CVE-2019-8942 EXPLOITDB HIGH javascript
Wordpress < 4.9.9 - Unrestricted File Upload
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
by allyshka
CVSS 8.8
CVE-2019-1674 EXPLOITDB HIGH text
Cisco Webex Meetings < 33.6.6 - OS Command Injection
A vulnerability in the update service of Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools. This vulnerability is fixed in Cisco Webex Meetings Desktop App Release 33.6.6 and 33.9.1 releases. This vulnerability is fixed in Cisco Webex Productivity Tools Release 33.0.7.
by SecureAuth
CVSS 7.8
CVE-2019-8943 EXPLOITDB MEDIUM javascript
Wordpress < 5.0.3 - Path Traversal
WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.
by allyshka
CVSS 6.5
EIP-2026-103678 EXPLOITDB text VERIFIED
tcpdump < 4.9.3 - Multiple Heap-Based Out-of-Bounds Reads
by Google Security Research
EIP-2026-103499 EXPLOITDB text VERIFIED
Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost
by Google Security Research
EIP-2026-103498 EXPLOITDB text VERIFIED
Google Chrome < M72 - RenderFrameHostImpl::CreateMediaStreamDispatcherHost Use-After-Free
by Google Security Research
EIP-2026-103497 EXPLOITDB text VERIFIED
Google Chrome < M72 - PaymentRequest Service Use-After-Free
by Google Security Research
EIP-2026-103496 EXPLOITDB text VERIFIED
Google Chrome < M72 - FileWriterImpl Use-After-Free
by Google Security Research
EIP-2026-103366 EXPLOITDB text VERIFIED
macOS XNU - Copy-on-Write Behavior Bypass via Mount of User-Owned Filesystem Image
by Google Security Research
CVE-2019-9162 EXPLOITDB HIGH text VERIFIED
Linux Kernel < 4.19.25 - Out-of-Bounds Write
In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
by Google Security Research
CVSS 7.8