Exploitdb Exploits

50,121 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-104175 EXPLOITDB ruby
Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit)
by Emir Polat
EIP-2026-101469 EXPLOITDB text
TEM Opera Plus FM Family Transmitter 35.45 - XSRF
by LiquidWorm
EIP-2026-101468 EXPLOITDB text
TEM Opera Plus FM Family Transmitter 35.45 - Remote Code Execution
by LiquidWorm
CVE-2024-58316 EXPLOITDB HIGH text
Puneethreddyhc Online Shopping System Advanced - SQL Injection
Online Shopping System Advanced 1.0 contains a SQL injection vulnerability in the payment_success.php script that allows attackers to inject malicious SQL through the unfiltered 'cm' parameter. Attackers can exploit the vulnerability by sending crafted SQL queries to retrieve sensitive database information by manipulating the user ID parameter.
by Furkan Gedik
CVSS 7.5
CVE-2022-44151 EXPLOITDB CRITICAL text
Simple Inventory Management System v1.0 - SQL Injection
Simple Inventory Management System v1.0 is vulnerable to SQL Injection via /ims/login.php.
by SoSPiro
CVSS 9.8
CVE-2024-22318 EXPLOITDB MEDIUM text
IBM i Access Client Solutions <1.1.2-1.1.4, <1.1.4.3-1.1.9.4 - Info...
IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
by hyp3rlinx
CVSS 5.1
EIP-2026-112562 EXPLOITDB text
taskhub 2.8.7 - SQL Injection
by CraCkEr
EIP-2026-106081 EXPLOITDB python
comments-like-dislike < 1.2.0 - Authenticated (Subscriber+) Plugin Setting Reset
by Diaa Hanna
EIP-2026-104726 EXPLOITDB text
Flashcard Quiz App v1.0 - 'card' SQL Injection
by SoSPiro
EIP-2026-104725 EXPLOITDB text
FAQ Management System v1.0 - 'faq' SQL Injection
by SoSPiro
CVE-2024-25735 EXPLOITDB CRITICAL text
WyreStorm Apollo VX20 - Information Disclosure
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext passwords via a SoftAP /device/config GET request.
by hyp3rlinx
CVSS 9.1
CVE-2024-25734 EXPLOITDB HIGH text
Wyrestorm Apollo Vx20 Firmware < 1.3.58 - Information Disclosure
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. The TELNET service prompts for a password only after a valid username is entered, which might make it easier for remote attackers to enumerate user accounts.
by hyp3rlinx
CVSS 7.5
CVE-2024-25736 EXPLOITDB HIGH text
Wyrestorm Apollo Vx20 Firmware < 1.3.58 - Improper Access Control
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can restart the device via a /device/reboot GET request.
by hyp3rlinx
CVSS 7.5
EIP-2026-113309 EXPLOITDB text
WEBIGniter v28.7.23 - Stored Cross Site Scripting (XSS)
by Sagar Banwa
CVE-2024-58305 EXPLOITDB HIGH python
WonderCMS 4.3.2 - XSS
WonderCMS 4.3.2 contains a cross-site scripting vulnerability that allows attackers to inject malicious JavaScript through the module installation endpoint. Attackers can craft a specially designed XSS payload to install a reverse shell module and execute remote commands by tricking an authenticated administrator into accessing a malicious link.
by Anas Zakir
CVSS 8.8
EIP-2026-119643 EXPLOITDB text
Microsoft Windows Defender Bypass - Detection Mitigation Bypass
by hyp3rlinx
EIP-2026-119642 EXPLOITDB text
Microsoft Windows Defender - VBScript Detection Bypass
by hyp3rlinx
EIP-2026-116586 EXPLOITDB python
XAMPP - Buffer Overflow POC
by Talson
EIP-2026-111056 EXPLOITDB php
phpFox < 4.8.13 - (redirect) PHP Object Injection Exploit
by Egidio Romano
EIP-2026-108090 EXPLOITDB python
JFrog Artifactory < 7.25.4 - Blind SQL Injection
by ardr
EIP-2026-106858 EXPLOITDB text
Employee Management System v1 - 'email' SQL Injection
by SoSPiro
CVE-2023-3897 EXPLOITDB MEDIUM text
SureMDM On-premise <6.31 - Info Disclosure
Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message. This issue affects SureMDM On-premise: 6.31 and below version
by Jonas Benjamin Friedli
CVSS 4.8
EIP-2026-104434 EXPLOITDB text
SISQUALWFM 7.1.319.103 - Host Header Injection
by Omer Shaik
EIP-2026-103298 EXPLOITDB python
Metabase 0.46.6 - Pre-Auth Remote Code Execution
by Musyoka Ian
EIP-2026-101122 EXPLOITDB python
DS Wireless Communication - Remote Code Execution
by MikeIsAStar