Exploitdb Exploits

50,121 exploits tracked across all sources.

Sort: Activity Stars
CVE-2025-53770 EXPLOITDB CRITICAL python
Microsoft SharePoint Server - Code Injection
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
by Agampreet Singh
CVSS 9.8
CVE-2025-49730 EXPLOITDB HIGH text
Microsoft Windows 10 1507 < 10.0.10240.21073 - Heap Buffer Overflow
Time-of-check time-of-use (toctou) race condition in Microsoft Windows QoS scheduler allows an authorized attacker to elevate privileges locally.
by nu11secur1ty
CVSS 7.8
CVE-2025-50286 EXPLOITDB HIGH text
Grav CMS <1.7.48 - RCE
A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.
by /bin/neko
CVSS 8.1
CVE-2025-41228 EXPLOITDB MEDIUM text
VMware ESXi - XSS
VMware ESXi and vCenter Server contain a reflected cross-site scripting vulnerability due to improper input validation. A malicious actor with network access to the login page of certain ESXi host or vCenter Server URL paths may exploit this issue to steal cookies or redirect to malicious websites.
by Imraan Khan (Lich-Sec)
CVSS 4.3
CVE-2024-4879 EXPLOITDB CRITICAL python
ServiceNow - RCE
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
by İbrahimsql
CVSS 9.8
CVE-2025-8471 EXPLOITDB HIGH c
Projectworlds Online Admission System - Injection
A vulnerability, which was classified as critical, has been found in projectworlds Online Admission System 1.0. This issue affects some unknown processing of the file /adminlogin.php. The manipulation of the argument a_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
by Byte Reaper
CVSS 7.3
CVE-2024-27198 EXPLOITDB CRITICAL python
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
by İbrahimsql
CVSS 9.8
CVE-2023-40028 EXPLOITDB MEDIUM python
Ghost < 5.59.1 - Path Traversal
Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability.
by İbrahimsql
CVSS 4.9
CVE-2023-32235 EXPLOITDB HIGH python
Ghost < 5.42.1 - Path Traversal
Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
by İbrahimsql
CVSS 7.5
CVE-2025-8550 EXPLOITDB LOW c
Pybbs < 6.0.0 - Code Injection
A vulnerability was found in atjiu pybbs up to 6.0.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/topic/list. The manipulation of the argument Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named 2fe4a51afbce0068c291bc1818bbc8f7f3b01a22. It is recommended to apply a patch to fix this issue.
by Byte Reaper
CVSS 2.4
CVE-2025-7769 EXPLOITDB HIGH c
Tigo Energy's CCA - Command Injection
Tigo Energy's CCA is vulnerable to a command injection vulnerability in the /cgi-bin/mobile_api endpoint when the DEVICE_PING command is called, allowing remote code execution due to improper handling of user input. When used with default credentials, this enables attackers to execute arbitrary commands on the device that could cause potential unauthorized access, service disruption, and data exposure.
by Byte Reaper
CVE-2025-5777 EXPLOITDB HIGH python
Citrix Netscaler Application Delivery... - Use of Uninitialized Resource
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
by Yesith Alvarez
CVSS 7.5
CVE-2025-20124 EXPLOITDB CRITICAL python
Cisco ISE - Code Injection
A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device. This vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object to an affected API. A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges. Note:&nbsp;To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time.
by İbrahimsql
CVSS 9.9
CVE-2025-20125 EXPLOITDB CRITICAL python
Cisco ISE - Info Disclosure
A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node. This vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to attacker to obtain information, modify system configuration, and reload the device. Note:&nbsp;To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time.
by İbrahimsql
CVSS 9.1
CVE-2025-8730 EXPLOITDB CRITICAL c
Belkin F9K1009/F9K1010 <2.00.04/2.09 - Hard-coded Credentials
A vulnerability was found in Belkin F9K1009 and F9K1010 2.00.04/2.00.09 and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to hard-coded credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
by Byte Reaper
CVSS 9.8
CVE-2025-49741 EXPLOITDB HIGH text
Microsoft Edge Chromium < 135.0.3179.98 - Information Disclosure
No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network.
by nu11secur1ty
CVSS 7.4
CVE-2025-49683 EXPLOITDB HIGH text
Microsoft Windows 10 1507 < 10.0.10240.21073 - Integer Overflow
Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to execute code locally.
by nu11secur1ty
CVSS 7.8
CVE-2023-3460 EXPLOITDB CRITICAL python
Ultimate Member <2.6.7 - Privilege Escalation
The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.
by Gurjot Singh
CVSS 9.8
CVE-2025-54769 EXPLOITDB HIGH c
Xorux Lpar2rrd < 8.04 - Remote Code Execution
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
by Byte Reaper
CVSS 8.8
CVE-2025-41373 EXPLOITDB HIGH c
Tesigandia Gandia Integra Total < 4.4.2236.1 - SQL Injection
A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/hislistadoacciones.php.
by Byte Reaper
CVSS 8.8
CVE-2025-54589 EXPLOITDB MEDIUM c
9001 Copyparty < 1.18.7 - Basic XSS
Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.
by Byte Reaper
CVSS 6.3
CVE-2025-8191 EXPLOITDB LOW c
Macrozheng Mall < 1.0.3 - Code Injection
A vulnerability, which was classified as problematic, was found in macrozheng mall up to 1.0.3. Affected is an unknown function of the file /swagger-ui/index.html of the component Swagger UI. The manipulation of the argument configUrl leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor deleted the GitHub issue for this vulnerability without any explanation. Afterwards the vendor was contacted early about this disclosure via email but did not respond in any way.
by Byte Reaper
CVSS 3.5
CVE-2025-32429 EXPLOITDB CRITICAL c
XWiki Platform - SQL Injection
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 9.4-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, it's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm. It's injected as is as an ORDER BY value. This is fixed in versions 16.10.6 and 17.3.0-rc-1.
by Byte Reaper
CVSS 9.8
CVE-2025-50481 EXPLOITDB MEDIUM text
Mezzanine CMS 6.1.0 - XSS
A cross-site scripting (XSS) vulnerability in the component /blog/blogpost/add of Mezzanine CMS v6.1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into a blog post.
by Kevin Dicks
CVSS 4.8
CVE-2025-48932 EXPLOITDB text VERIFIED
Invision Community 4.7.20 - (calendar/view.php) SQL Injection
by Egidio Romano