Exploitdb Exploits

49,989 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-102678 EXPLOITDB python
MiniUPnPd 2.1 - Out-of-Bounds Read
by b1ack0wl
CVE-2019-25693 EXPLOITDB HIGH text
ResourceSpace 8.6 SQL Injection via collection_edit.php
ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with crafted SQL payloads in the keywords field to extract sensitive database information including schema names, user credentials, and other confidential data.
by dd_
CVSS 7.1
CVE-2019-25691 EXPLOITDB HIGH python
Faleemi Desktop Software 1.8 Local Buffer Overflow SEH DEP Bypass
Faleemi Desktop Software 1.8 contains a local buffer overflow vulnerability in the System Setup dialog that allows attackers to bypass DEP protections through structured exception handling exploitation. Attackers can inject a crafted payload into the Save Path for Snapshot and Record file field to trigger a buffer overflow and execute arbitrary code via ROP chain gadgets.
by bzyo
CVSS 8.4
CVE-2019-25695 EXPLOITDB HIGH python
R 3.4.4 Local Buffer Overflow Windows XP SP3
R 3.4.4 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by injecting malicious input into the GUI Preferences language field. Attackers can craft a payload with a 292-byte offset and JMP ESP instruction to execute commands like calc.exe when the payload is pasted into the Language for menus and messages field.
by Dino Covotsos
CVSS 8.4
CVE-2019-25701 EXPLOITDB HIGH python
Easy Video to iPod Converter 1.6.20 Local Buffer Overflow SEH
Easy Video to iPod Converter 1.6.20 contains a local buffer overflow vulnerability in the user registration field that allows local attackers to overwrite the structured exception handler. Attackers can input a crafted payload exceeding 996 bytes in the username field to trigger SEH overwrite and execute arbitrary code with user privileges.
by Nawaf Alkeraithe
CVSS 8.4
CVE-2019-25699 EXPLOITDB HIGH text
Newsbull Haber Script 1.0.0 Authenticated SQL Injection via search parameter
Newsbull Haber Script 1.0.0 contains multiple SQL injection vulnerabilities in the search parameter that allow authenticated attackers to extract database information through time-based, blind, and boolean-based injection techniques. Attackers can inject malicious SQL code through the search parameter in endpoints like /admin/comment/records, /admin/category/records, /admin/news/records, and /admin/menu/childs to manipulate database queries and retrieve sensitive data.
by Mehmet EMIROGLU
CVSS 7.1
CVE-2019-25697 EXPLOITDB HIGH text
CMSsite 1.0 SQL Injection via category.php
CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to category.php with malicious cat_id values to extract sensitive database information including usernames and credentials.
by Majid kalantari
CVSS 8.2
CVE-2018-25239 EXPLOITDB MEDIUM python
Smart VPN 1.1.3.0 Denial of Service via Search
Smart VPN 1.1.3.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting oversized input through the search interface. Attackers can paste a buffer of 2100 characters into the top right search bar to trigger an unhandled exception that crashes the application.
by 0xB9
CVSS 6.2
CVE-2018-25130 EXPLOITDB MEDIUM python
Beward Intercom 2.3.1 - Info Disclosure
Beward Intercom 2.3.1 contains a credentials disclosure vulnerability that allows local attackers to access plain-text authentication credentials stored in an unencrypted database file. Attackers can read the BEWARD.INTERCOM.FDB file to extract usernames and passwords, enabling unauthorized access to IP cameras and door stations.
by LiquidWorm
CVSS 6.2
CVE-2018-6892 EXPLOITDB CRITICAL python
Cloudme Sync < 1.10.9 - Memory Corruption
An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the "CloudMe Sync" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution.
by Matteo Malvica
CVSS 9.8
EIP-2026-113530 EXPLOITDB text
WordPress Plugin Ad Manager WD 1.0.11 - Arbitrary File Download
by 41!kh4224rDz
EIP-2026-112579 EXPLOITDB text VERIFIED
Teameyo Project Management System 1.0 - SQL Injection
by Ihsan Sencan
CVE-2019-6979 EXPLOITDB MEDIUM text
MyBB 1.0.2 - XSS
An issue was discovered in the User IP History Logs (aka IP_History_Logs) plugin 1.0.2 for MyBB. There is XSS via the admin/modules/tools/ip_history_logs.php useragent field.
by 0xB9
CVSS 6.1
EIP-2026-109426 EXPLOITDB text
Mess Management System 1.0 - SQL Injection
by Ihsan Sencan
EIP-2026-106035 EXPLOITDB text
CMSsite 1.0 - 'search' SQL Injection
by Majid kalantari
EIP-2026-105726 EXPLOITDB text
Care2x 2.7 (HIS) Hospital Information System - Multiple SQL Injection
by Carlos Avila
CVE-2019-6716 EXPLOITDB CRITICAL text
Logonbox Nervepoint Access Manager - IDOR
An unauthenticated Insecure Direct Object Reference (IDOR) in Wicket Core in LogonBox Nervepoint Access Manager 2013 through 2017 allows a remote attacker to enumerate internal Active Directory usernames and group names, and alter back-end server jobs (backup and synchronization jobs), which could allow for the possibility of a Denial of Service attack via a modified jobId parameter in a runJob.html GET request.
by 0v3rride
CVSS 9.4
EIP-2026-103352 EXPLOITDB python
MySQL User-Defined (Linux) (x86) - 'sys_exec' Local Privilege Escalation
by d7x
CVE-2019-6804 EXPLOITDB MEDIUM text
Pagerduty Rundeck < 3.0.13 - XSS
An XSS issue was discovered on the Job Edit page in Rundeck Community Edition before 3.0.13, related to assets/javascripts/workflowStepEditorKO.js and views/execution/_wfitemEdit.gsp.
by Ishaq Mohammed
CVSS 6.1
CVE-2019-1653 EXPLOITDB HIGH python
Cisco RV320 and RV325 Unauthenticated Remote Code Execution
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
by Harom Ramos
CVSS 7.5
CVE-2019-1642 EXPLOITDB MEDIUM text VERIFIED
Cisco Secure Firewall Management Center - XSS
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
by Bhushan B. Patil
CVSS 6.1
CVE-2019-6967 EXPLOITDB HIGH html
AirTies Air5341 <1.0.0.12 - CSRF
AirTies Air5341 1.0.0.12 devices allow cgi-bin/login CSRF.
by Ali Can Gönüllü
CVSS 8.8
CVE-2019-6973 EXPLOITDB HIGH bash
Sricam IP CCTV - DoS
Sricam IP CCTV cameras are vulnerable to denial of service via multiple incomplete HTTP requests because the web server (based on gSOAP 2.8.x) is configured for an iterative queueing approach (aka non-threaded operation) with a timeout of several seconds.
by Andrew Watson
CVSS 7.5
CVE-2019-25574 EXPLOITDB MEDIUM text
Green CMS 2.x Path Traversal Arbitrary File Download
Green CMS 2.x contains a path traversal vulnerability that allows authenticated attackers to download arbitrary files and directories by injecting directory traversal sequences. Attackers can manipulate the theme_name parameter in the themeexporthandle action or supply base64-encoded file paths to the downfile action to retrieve sensitive files outside intended directories.
by Ihsan Sencan
CVSS 6.5
CVE-2019-25573 EXPLOITDB HIGH text
Green CMS 2.x SQL Injection via cat Parameter
Green CMS 2.x contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the cat parameter. Attackers can send GET requests to index.php with m=admin, c=posts, a=index parameters and inject SQL code in the cat parameter to manipulate database queries and extract sensitive information.
by Ihsan Sencan
CVSS 7.1