Exploitdb Exploits

49,996 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-5412 EXPLOITDB HIGH ruby
Imperva SecureSphere <12.0.0.50 - RCE
Imperva SecureSphere running v12.0.0.50 is vulnerable to local arbitrary code execution, escaping sealed-mode.
by 0x09AL
CVSS 7.8
CVE-2018-13416 EXPLOITDB CRITICAL text
Spirton Universal Media Server - XXE
In Universal Media Server (UMS) 7.1.0, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Remote, unauthenticated attackers can use this vulnerability to: (1) Access arbitrary files from the filesystem with the same permission as the user account running UMS, (2) Initiate SMB connections to capture a NetNTLM challenge/response and crack to cleartext password, or (3) Initiate SMB connections to relay a NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.
by Chris Moberly
CVSS 9.8
CVE-2018-8096 EXPLOITDB CRITICAL python
Datalust Seq <4.2.605 - Auth Bypass
Datalust Seq before 4.2.605 is vulnerable to Authentication Bypass (with the attacker obtaining admin access) via '"Name":"isauthenticationenabled","Value":false' in an api/settings/setting-isauthenticationenabled PUT request.
by Daniel Chactoura
CVSS 9.8
EIP-2026-114874 EXPLOITDB python VERIFIED
AgataSoft Auto PingMaster 1.5 - 'Host name' Denial of Service (PoC)
by Luis Martínez
CVE-2018-2892 EXPLOITDB HIGH c
Oracle Solaris <11 - Privilege Escalation
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Availability Suite Service). Supported versions that are affected are 10 and 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
by mu-b
CVSS 7.8
CVE-2018-14029 EXPLOITDB HIGH html
Creatiwity wityCMS 0.6.2 - CSRF
CSRF vulnerability in admin/user/edit in Creatiwity wityCMS 0.6.2 allows an attacker to take over a user account, as demonstrated by modifying the account's email field.
by Porhai Eung
CVSS 8.8
EIP-2026-112668 EXPLOITDB text VERIFIED
TI Online Examination System v2 - Arbitrary File Download
by AkkuS
EIP-2026-110449 EXPLOITDB text
PageResponse FB Inboxer Add-on 1.2 - 'search_field' SQL Injection
by AkkuS
EIP-2026-106175 EXPLOITDB python
CoSoSys Endpoint Protector 4.5.0.1 - (Authenticated) Remote Root Command Injection
by 0x09AL
EIP-2026-101528 EXPLOITDB text
ASUS DSL-N12E_C1 1.1.2.3_345 - Remote Command Execution
by Fakhri Zulkifli
EIP-2026-116760 EXPLOITDB python VERIFIED
Allok Fast AVI MPEG Splitter 1.2 - Buffer Overflow (PoC)
by Shubham Singh
EIP-2026-103718 EXPLOITDB text VERIFIED
WebRTC - VP8 Block Decoding Use-After-Free
by Google Security Research
EIP-2026-103717 EXPLOITDB text VERIFIED
WebRTC - H264 NAL Packet Processing Type Confusion
by Google Security Research
EIP-2026-103716 EXPLOITDB text VERIFIED
WebRTC - FEC Processing Overflow
by Google Security Research
EIP-2026-103224 EXPLOITDB ruby VERIFIED
SonicWall Global Management System - XMLRPC set_time_zone Command Injection (Metasploit)
by Metasploit
EIP-2026-116357 EXPLOITDB python VERIFIED
Switch Port Mapping Tool 2.81 - 'SNMP Community Name' Denial of Service (PoC)
by Luis Martínez
EIP-2026-115453 EXPLOITDB python VERIFIED
ipPulse 1.92 - 'Licence Key' Denial of Service (PoC)
by Shubham Singh
CVE-2018-14716 EXPLOITDB HIGH text
SEOmatic <3.1.4 - SSTI
A Server Side Template Injection (SSTI) was discovered in the SEOmatic plugin before 3.1.4 for Craft CMS, because requests that don't match any elements incorrectly generate the canonicalUrl, and can lead to execution of Twig code.
by 0xB455
CVSS 7.5
EIP-2026-101830 EXPLOITDB python
LG NAS 3718.510.a0 - Remote Command Execution
by 0x616163
EIP-2026-116761 EXPLOITDB python VERIFIED
Allok MOV Converter 4.6.1217 - Buffer Overflow (SEH)
by Shubham Singh
EIP-2026-115800 EXPLOITDB c
Microsoft Windows Kernel - 'win32k!NtUserConsoleControl' Denial of Service (PoC)
by vportal
EIP-2026-115452 EXPLOITDB python
ipPulse 1.92 - 'IP Address/HostName-Comment' Denial of Service (PoC)
by Luis Martínez
CVE-2017-15358 EXPLOITDB HIGH text
Charles < 4.2.1 - Race Condition
Race condition in the Charles Proxy Settings suid binary in Charles Proxy before 4.2.1 allows local users to gain privileges via vectors involving the --self-repair option.
by Mark Wadham
CVSS 7.0
CVE-2018-14728 EXPLOITDB CRITICAL text
Responsive FileManager 9.13.1 - SSRF
upload.php in Responsive FileManager 9.13.1 allows SSRF via the url parameter.
by GUIA BRAHIM FOUAD
CVSS 9.8
CVE-2018-14335 EXPLOITDB MEDIUM python
H2 <1.4.197 - Info Disclosure
An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.
by owodelta
CVSS 6.5