Exploitdb Exploits

50,121 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-4278 EXPLOITDB HIGH python
MasterStudy LMS <3.0.18 - Info Disclosure
The MasterStudy LMS WordPress Plugin WordPress plugin before 3.0.18 does not have proper checks in place during registration allowing anyone to register on the site as an instructor. They can then add courses and/or posts.
by Revan Arifio
CVSS 7.5
EIP-2026-113266 EXPLOITDB text
Webedition CMS v2.9.8.8 - Blind SSRF
by Mirabbas Ağalarov
EIP-2026-112038 EXPLOITDB text
Shuttle-Booking-Software v1.0 - Multiple-SQLi
by nu11secur1ty
EIP-2026-110120 EXPLOITDB text
Online ID Generator 1.0 - Remote Code Execution (RCE)
by nu11secur1ty
CVE-2023-4634 EXPLOITDB CRITICAL text
Media Library Assistant <3.09 - RCE
The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.
by Florent MONTEL
CVSS 9.8
EIP-2026-109149 EXPLOITDB text
Limo Booking Software v1.0 - CORS
by nu11secur1ty
CVE-2020-11060 EXPLOITDB HIGH python
GLPI <9.4.6 - Command Injection
In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.
by Brian Peters
CVSS 7.4
CVE-2023-4708 EXPLOITDB MEDIUM text
Infosoftbd Clcknshop - SQL Injection
A vulnerability was found in Infosoftbd Clcknshop 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /collection/all of the component GET Parameter Handler. The manipulation of the argument tag leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-238571. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
by CraCkEr
CVSS 6.3
CVE-2023-39362 EXPLOITDB HIGH text
Cacti < 1.2.25 - Command Injection
Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
by Antonio Francesco Sardella
CVSS 7.2
CVE-2023-38836 EXPLOITDB HIGH python
BoidCMS Command Injection
File Upload vulnerability in BoidCMS v.2.0.0 allows a remote attacker to execute arbitrary code by adding a GIF header to bypass MIME type checks.
by 1337kid
CVSS 8.8
CVE-2023-32707 EXPLOITDB HIGH python
Splunk Enterprise <9.0.5 - Privilege Escalation
In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests.
by Redway Security
CVSS 8.8
EIP-2026-103603 EXPLOITDB text
OpenPLC WebServer 3 - Denial of Service
by Kai Feng
EIP-2026-101424 EXPLOITDB text
Ruijie Reyee Mesh Router - MITM Remote Code Execution (RCE)
by Riyan Firmansyah of Seclab
CVE-2022-35919 EXPLOITDB HIGH python
MinIO - Info Disclosure
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. In affected versions all 'admin' users authorized for `admin:ServerUpdate` can selectively trigger an error that in response, returns the content of the path requested. Any normal OS system would allow access to contents at any arbitrary paths that are readable by MinIO process. Users are advised to upgrade. Users unable to upgrade may disable ServerUpdate API by denying the `admin:ServerUpdate` action for your admin users via IAM policies.
by Jenson Zhao
CVSS 7.4
CVE-2023-53875 EXPLOITDB HIGH python
GOM Player 2.3.90.5360 - RCE
GOM Player 2.3.90.5360 contains a remote code execution vulnerability in its Internet Explorer component that allows attackers to execute arbitrary code through DNS spoofing. Attackers can redirect victims using a malicious URL shortcut and WebDAV technique to run a reverse shell with SMB server interaction.
by M. Akil Gündoğan
CVSS 8.8
CVE-2023-53874 EXPLOITDB CRITICAL python
GOM Player <2.3.90.5360 - Buffer Overflow
GOM Player 2.3.90.5360 contains a buffer overflow vulnerability in the equalizer preset name input field that allows attackers to crash the application. Attackers can overwrite the preset name with 260 'A' characters to trigger a buffer overflow and cause application instability.
by Ahmet Ümit BAYRAM
CVSS 9.8
CVE-2023-53873 EXPLOITDB HIGH python
SyncBreeze 15.2.24 - DoS
SyncBreeze 15.2.24 contains a denial of service vulnerability in the login authentication mechanism that allows attackers to crash the service. Attackers can send an oversized password parameter with repeated 'password=' values to overwhelm the login endpoint and potentially disrupt service availability.
by mohamed youssef
CVE-2023-53872 EXPLOITDB CRITICAL python
Wp2Fac 1.0 - Command Injection
Wp2Fac 1.0 contains an OS command injection vulnerability in the send.php endpoint that allows remote attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'numara' parameter by appending shell commands with '&' operators to execute malicious code.
by Ahmet Ümit BAYRAM
CVE-2023-53871 EXPLOITDB CRITICAL text
Soosyze 2.0.0 - Code Injection
Soosyze 2.0.0 contains a file upload vulnerability that allows attackers to upload arbitrary HTML files with embedded PHP code to the application. Attackers can exploit the broken file upload mechanism to potentially view sensitive file paths and execute malicious PHP scripts on the server.
by nu11secur1ty
CVSS 9.8
CVE-2023-53870 EXPLOITDB MEDIUM text
Jorani 1.0.3 - XSS
Jorani 1.0.3 contains a reflected cross-site scripting vulnerability in the language parameter that allows attackers to inject malicious scripts. Attackers can craft XSS payloads in the language parameter to execute arbitrary JavaScript and potentially steal user session information.
by nu11secur1ty
CVE-2022-4953 EXPLOITDB MEDIUM text
Elementor Website Builder <3.5.5 - XSS
The Elementor Website Builder WordPress plugin before 3.5.5 does not filter out user-controlled URLs from being loaded into the DOM. This could be used to inject rogue iframes that point to malicious URLs.
by Miguel Santareno
CVSS 6.1
CVE-2023-4548 EXPLOITDB MEDIUM text
SPA-Cart eCommerce CMS 1.9.0.3 - SQL Injection
A vulnerability classified as critical has been found in SPA-Cart eCommerce CMS 1.9.0.3. This affects an unknown part of the file /search of the component GET Parameter Handler. The manipulation of the argument filter[brandid] leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-238059.
by CraCkEr
CVSS 6.3
EIP-2026-106580 EXPLOITDB text
Drupal 10.1.2 - web-cache-poisoning-External-service-interaction
by nu11secur1ty
CVE-2022-31470 EXPLOITDB MEDIUM text
Axigen Mobile WebMail <10.2.3.12 & <10.3.3.47 - XSS
An XSS vulnerability in the index_mobile_changepass.hsp reset-password section of Axigen Mobile WebMail before 10.2.3.12 and 10.3.x before 10.3.3.47 allows attackers to run arbitrary Javascript code that, using an active end-user session (for a logged-in user), can access and retrieve mailbox content.
by AmirZargham
CVSS 6.1
CVE-2023-34723 EXPLOITDB HIGH python
Jaycar La5570 Firmware - Symlink Following
An issue was discovered in TechView LA-5570 Wireless Gateway 1.0.19_T53, allows attackers to gain sensitive information via /config/system.conf.
by The Security Team [exploitsecurity.io]
CVSS 7.5