Exploitdb Exploits

50,121 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-116551 EXPLOITDB python
Windows TCP/IP - RCE Checker and Denial of Service
by Photubias
EIP-2026-114681 EXPLOITDB python
Invesalius3 - Remote Code Execution
by Alessio Romano (sfoffo)_ Riccardo Degli Esposti (partywave)
EIP-2026-104362 EXPLOITDB text
NoteMark < 0.13.0 - Stored XSS
by Alessio Romano (sfoffo)
EIP-2026-104264 EXPLOITDB text
Gitea 1.22.0 - Stored XSS
by Catalin Iovita_ Alexandru Postolache
EIP-2026-103262 EXPLOITDB python
Aurba 501 - Authenticated RCE
by Hosein Vita
EIP-2026-101789 EXPLOITDB python
HughesNet HT2000W Satellite Modem - Password Reset
by Simon Greenblatt
EIP-2026-101707 EXPLOITDB text
Elber Wayber Analog/Digital Audio STL 4.00 - Device Config Disclosure
by LiquidWorm
EIP-2026-101706 EXPLOITDB text
Elber Wayber Analog/Digital Audio STL 4.00 - Authentication Bypass
by LiquidWorm
EIP-2026-101701 EXPLOITDB text
Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Device Config
by LiquidWorm
EIP-2026-101700 EXPLOITDB text
Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass
by LiquidWorm
CVE-2024-46226 EXPLOITDB MEDIUM text
Helpdeskz < 2.0.2 - XSS
A stored cross site scripting (XSS) vulnerability in HelpDeskZ < v2.0.2 allows remote attackers to execute arbitrary JavaScript in the administration panel by including a malicious payload into the file name and upload file function when creating a new ticket.
by Md. Sadikul Islam
CVSS 4.8
EIP-2026-104191 EXPLOITDB text
Calibre-web 0.6.21 - Stored XSS
by Catalin Iovita_ Alexandru Postolache
CVE-2024-58288 EXPLOITDB HIGH text
Genexus Protection Server 9.7.2.10 - Code Injection
Genexus Protection Server 9.7.2.10 contains an unquoted service path vulnerability in the protsrvservice Windows service configuration. Attackers can exploit the unquoted binary path to execute arbitrary code with elevated LocalSystem privileges by placing malicious executables in specific file system locations.
by SamAlucard
EIP-2026-117928 EXPLOITDB text
SolarWinds Kiwi Syslog Server 9.6.7.1 - Unquoted Service Path
by Milad karimi
EIP-2026-117730 EXPLOITDB text
Oracle Database 12c Release 1 - Unquoted Service Path
by Milad karimi
CVE-2024-40422 EXPLOITDB CRITICAL python
stitionai devika v1 - Path Traversal
The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system.
by Alperen Ergel
CVSS 9.1
EIP-2026-104287 EXPLOITDB python
Ivanti vADC 9.9 - Authentication Bypass
by ohnoisploited
EIP-2026-116915 EXPLOITDB text
Bonjour Service 'mDNSResponder.exe' - Unquoted Service Path Privilege Escalation
by bios
CVE-2024-58290 EXPLOITDB CRITICAL text
Xhibiter NFT Marketplace 1.10.2 - SQL Injection
Xhibiter NFT Marketplace 1.10.2 contains a SQL injection vulnerability in the collections endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can exploit boolean-based, time-based, and UNION-based SQL injection techniques to potentially extract or manipulate database information by sending crafted payloads to the collections page.
by Sohel Yousef
CVE-2024-58289 EXPLOITDB MEDIUM text
Microweber - XSS
Microweber 2.0.15 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts into user profile fields. Attackers can input script payloads in the first name field that will execute when the profile is viewed by other users, potentially stealing session cookies and executing arbitrary JavaScript.
by tmrswrr
CVSS 5.4
EIP-2026-106295 EXPLOITDB text
Customer Support System 1.0 - Stored XSS
by Geraldo Alcantara
EIP-2026-105349 EXPLOITDB text
Azon Dominator Affiliate Marketing Script - SQL Injection
by Buğra Enis Dönmez
CVE-2024-58291 EXPLOITDB MEDIUM text
Flatboard 3.2 - XSS
Flatboard 3.2 contains a stored cross-site scripting vulnerability that allows authenticated administrators to inject malicious scripts in forum information fields. Attackers can insert JavaScript payloads that execute when other users view the forum, potentially stealing session cookies and executing client-side scripts.
by tmrswrr
EIP-2026-111445 EXPLOITDB python
Poultry Farm Management System v1.0 - Remote Code Execution (RCE)
by Jerry Thomas
EIP-2026-105313 EXPLOITDB text
Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS)
by Jerry Thomas