Exploitdb Exploits

49,989 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-14485 EXPLOITDB CRITICAL text
BlogEngine.NET 3.3 - XML External Entity (XXE)
BlogEngine.NET 3.3 allows XXE attacks via the POST body to metaweblog.axd.
by Netsparker
CVSS 9.8
CVE-2018-8584 EXPLOITDB HIGH text VERIFIED
Windows - Privilege Escalation
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers.
by Google Security Research
CVSS 7.8
CVE-2018-8269 EXPLOITDB HIGH ruby
Microsoft Data OData - DoS
A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData.
by Gal Zror
CVSS 7.5
EIP-2026-103503 EXPLOITDB html
Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory. Denial of Service (PoC)
by Bogdan Kurinnoy
EIP-2026-102716 EXPLOITDB c VERIFIED
polkit - Temporary auth Hijacking via PID Reuse and Non-atomic Fork
by Google Security Research
CVE-2018-7355 EXPLOITDB MEDIUM text
ZTE Mf65 Firmware < 1.0.0b05 - XSS
All versions up to V1.0.0B05 of ZTE MF65 and all versions up to V1.0.0B02 of ZTE MF65M1 are impacted by cross-site scripting vulnerability. Due to improper neutralization of input during web page generation, an attacker could exploit this vulnerability to conduct reflected XSS or HTML injection attacks on the devices.
by Nathu Nandwani
CVSS 6.1
CVE-2019-25710 EXPLOITDB HIGH text
Dolibarr ERP-CRM 8.0.4 SQL Injection via rowid Parameter
Dolibarr ERP-CRM 8.0.4 contains an SQL injection vulnerability in the rowid parameter of the admin dict.php endpoint that allows attackers to execute arbitrary SQL queries. Attackers can inject malicious SQL code through the rowid POST parameter to extract sensitive database information using error-based SQL injection techniques.
by Mehmet Onder
CVSS 8.2
CVE-2019-25709 EXPLOITDB CRITICAL python
CF Image Hosting Script 1.6.5 Unauthorized Database Access
CF Image Hosting Script 1.6.5 allows unauthenticated attackers to download and decode the application database by accessing the imgdb.db file in the upload/data directory. Attackers can extract delete IDs stored in plaintext from the deserialized database and use them to delete all pictures via the d parameter.
by David Tavarez
CVSS 9.8
EIP-2026-103728 EXPLOITDB text VERIFIED
Wireshark - 'get_t61_string' Heap Out-of-Bounds Read
by Google Security Research
EIP-2026-103727 EXPLOITDB text VERIFIED
Wireshark - 'get_t61_string' Heap Out-of-Bounds Read
by Google Security Research
CVE-2019-25713 EXPLOITDB HIGH text
MyT-PM 1.5.1 SQL Injection via Charge[group_total] Parameter
MyT-PM 1.5.1 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the Charge[group_total] parameter. Attackers can submit crafted POST requests to the /charge/admin endpoint with error-based, time-based blind, or stacked query payloads to extract sensitive database information or manipulate data.
by Mehmet Onder
CVSS 7.1
CVE-2019-25712 EXPLOITDB MEDIUM python
BlueAuditor 1.7.2.0 Buffer Overflow Denial of Service via Registration Key
BlueAuditor 1.7.2.0 contains a buffer overflow vulnerability in the registration key field that allows local attackers to crash the application by submitting an oversized key value. Attackers can trigger a denial of service by entering a 256-byte buffer of repeated characters in the Key registration field, causing the application to crash during registration processing.
by Luis Martínez
CVSS 6.2
CVE-2019-25711 EXPLOITDB MEDIUM python
SpotFTP Password Recover 2.4.2 Denial of Service via Name Field
SpotFTP Password Recover 2.4.2 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an oversized buffer in the Name field during registration. Attackers can generate a 256-byte payload, paste it into the Name input field, and trigger a crash when submitting the registration code.
by Luis Martínez
CVSS 6.2
CVE-2019-25454 EXPLOITDB MEDIUM text
phpMoAdmin 1.1.5 - XSS
phpMoAdmin 1.1.5 contains a stored cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the collection parameter. Attackers can send GET requests to moadmin.php with script payloads in the collection parameter during collection creation to execute arbitrary JavaScript in users' browsers.
by Ozer Goker
CVSS 6.1
CVE-2019-25453 EXPLOITDB MEDIUM text
phpMoAdmin 1.1.5 - XSS
phpMoAdmin 1.1.5 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the newdb parameter. Attackers can craft URLs with JavaScript payloads in the newdb parameter of moadmin.php to execute arbitrary code in users' browsers when they visit the malicious link.
by Ozer Goker
CVSS 6.1
CVE-2019-25451 EXPLOITDB HIGH text
phpMoAdmin 1.1.5 - CSRF
phpMoAdmin 1.1.5 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized database operations by crafting malicious requests. Attackers can trick authenticated users into submitting GET requests to moadmin.php with parameters like action, db, and collection to create, drop, or repair databases and collections without user consent.
by Ozer Goker
CVSS 8.8
CVE-2018-20525 EXPLOITDB CRITICAL text
Roxyfileman Roxy Fileman - Path Traversal
Roxy Fileman 1.4.5 allows Directory Traversal in copydir.php, copyfile.php, and fileslist.php.
by Pongtorn Angsuchotmetee_ Vittawat Masaree
CVSS 9.1
CVE-2019-25259 EXPLOITDB MEDIUM html
Leica Geosystems GR10/GR25/GR30/GR50 4.30.063 - CSRF
Leica Geosystems GR10/GR25/GR30/GR50 GNSS 4.30.063 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without request validation. Attackers can trick logged-in users into executing unauthorized actions by crafting malicious web pages that submit requests to the application.
by LiquidWorm
CVSS 5.3
CVE-2018-25131 EXPLOITDB HIGH html
Leica Geosystems GR10/GR25/GR30/GR50 4.30.063 - XSS
Leica Geosystems GR10/GR25/GR30/GR50 GNSS 4.30.063 contains a stored cross-site scripting vulnerability in the configuration file upload functionality. Attackers can upload a malicious HTML file to that executes arbitrary JavaScript in a user's browser session when viewed.
by LiquidWorm
CVSS 7.2
CVE-2018-20221 EXPLOITDB HIGH text
Deltek Ajera Timesheets <9.10.16 - Code Injection
Secure/SAService.rem in Deltek Ajera Timesheets 9.10.16 and prior are vulnerable to remote code execution via deserialization of untrusted user input from an authenticated user. The executed code will run as the IIS Application Pool that is running the application.
by Anthony Cole
CVSS 8.8
CVE-2018-18435 EXPLOITDB HIGH text
Kioware Server < 4.9.6 - Incorrect Permission Assignment
KioWare Server version 4.9.6 and older installs by default to "C:\kioware_com" with weak folder permissions granting any user full permission "Everyone: (F)" to the contents of the directory and it's sub-folders. In addition, the program installs a service called "KWSService" which runs as "Localsystem", this will allow any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a malicious one.
by Hashim Jawad
CVSS 7.8
EIP-2026-115645 EXPLOITDB html
Microsoft Edge 44.17763.1.0 - NULL Pointer Dereference
by Bogdan Kurinnoy
EIP-2026-115272 EXPLOITDB python
Foscam Video Management System 1.1.4.9 - 'Username' Denial of Service (PoC)
by Luis Martínez
EIP-2026-115271 EXPLOITDB python
Foscam Video Management System 1.1.4.9 - 'Username' Denial of Service (PoC)
by Luis Martínez
EIP-2026-114671 EXPLOITDB ruby
Mailcleaner - (Authenticated) Remote Code Execution (Metasploit)
by Mehmet Ince