Text Exploits

31,346 exploits tracked across all sources.

Sort: Activity Stars
CVE-2020-12429 EXPLOITDB CRITICAL text
Online Course Registration 2.0 - SQL Injection
Online Course Registration 2.0 has multiple SQL injections that would can lead to a complete database compromise and authentication bypass in the login pages: admin/change-password.php, admin/check_availability.php, admin/index.php, change-password.php, check_availability.php, includes/header.php, index.php, and pincode-verification.php.
by Daniel Monzón
CVSS 9.8
EIP-2026-110812 EXPLOITDB text
PHP-Fusion 9.03.50 - 'Edit Profile' Arbitrary File Upload
by Besim
EIP-2026-110181 EXPLOITDB text
Online shopping system advanced 1.0 - 'p' SQL Injection
by Majid kalantari
CVE-2020-12242 EXPLOITDB HIGH text
Valvesoftware Source - OS Command Injection
Valve Source allows local users to gain privileges by writing to the /tmp/hl2_relaunch file, which is later executed in the context of a different user account.
by 0xEmma
CVSS 7.8
CVE-2025-34029 EXPLOITDB HIGH text
Edimax EW-7438RPn Mini <1.13 - Command Injection
An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.
by Besim
CVSS 8.8
CVE-2025-34024 EXPLOITDB HIGH text
Edimax EW-7438RPn <1.13 - Command Injection
An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.
by Besim
CVSS 8.8
CVE-2020-37094 EXPLOITDB CRITICAL text
EspoCRM 5.8.5 - Auth Bypass
EspoCRM 5.8.5 contains an authentication vulnerability that allows attackers to access other user accounts by manipulating authorization headers. Attackers can decode and modify Basic Authorization and Espo-Authorization tokens to gain unauthorized access to administrative user information and privileges.
by Besim
CVSS 9.8
CVE-2020-37059 EXPLOITDB HIGH text
Popcorn Time 6.2.1.14 - Privilege Escalation
Popcorn Time 6.2.1.14 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can insert malicious executables in Program Files (x86) or system root directories to be executed with SYSTEM-level permissions during service startup.
by Uriel Yochpaz
CVSS 7.8
EIP-2026-102368 EXPLOITDB text
Furukawa Electric ConsciusMAP 2.8.1 - Remote Code Execution
by LiquidWorm
EIP-2026-112925 EXPLOITDB text
User Management System 2.0 - Persistent Cross-Site Scripting
by Besim
EIP-2026-112924 EXPLOITDB text
User Management System 2.0 - Authentication Bypass
by Besim
EIP-2026-109108 EXPLOITDB text
Library CMS Powerful Book Management System 2.2.0 - Session Fixation
by Ismail Tasdelen
EIP-2026-106110 EXPLOITDB text
Complaint Management System 4.2 - Persistent Cross-Site Scripting
by Besim
EIP-2026-106109 EXPLOITDB text
Complaint Management System 4.2 - Cross-Site Request Forgery (Delete User)
by Besim
EIP-2026-106108 EXPLOITDB text
Complaint Management System 4.2 - Authentication Bypass
by Besim
EIP-2026-102295 EXPLOITDB text
Sky File 2.1.0 iOS - Directory Traversal
by Vulnerability-Lab
CVE-2020-37097 EXPLOITDB HIGH text
Edimax EW-7438RPn <1.13 - Info Disclosure
Edimax EW-7438RPn 1.13 contains an information disclosure vulnerability that exposes WiFi network configuration details through the wlencrypt_wiz.asp file. Attackers can access the script to retrieve sensitive information including WiFi network name and plaintext password stored in device configuration variables.
by Besim
CVSS 7.5
CVE-2020-37096 EXPLOITDB MEDIUM text
Edimax EW-7438RPn <1.13 - CSRF
Edimax EW-7438RPn 1.13 contains a cross-site request forgery vulnerability in the MAC filtering configuration interface. Attackers can craft malicious web pages to trick users into adding unauthorized MAC addresses to the device's filtering rules without their consent.
by Besim
CVSS 5.3
EIP-2026-103295 EXPLOITDB text
Mahara 19.10.2 CMS - Persistent Cross-Site Scripting
by Vulnerability-Lab
CVE-2025-34079 EXPLOITDB HIGH text
NSClient++ <0.5.2.35 - Authenticated RCE
An authenticated remote code execution vulnerability exists in NSClient++ version 0.5.2.35 when the web interface and ExternalScripts module are enabled. A remote attacker with the administrator password can authenticate to the web interface (default port 8443), inject arbitrary commands as external scripts via the /settings/query.json API, save the configuration, and trigger the script via the /query/{name} endpoint. The injected commands are executed with SYSTEM privileges, enabling full remote compromise. This capability is an intended feature, but the lack of safeguards or privilege separation makes it risky when exposed to untrusted actors.
by kindredsec
CVSS 7.8
CVE-2025-34078 EXPLOITDB HIGH text
NSClient++ <0.5.2.35 - Privilege Escalation
A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API. This behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions.
by kindredsec
CVSS 7.8
CVE-2020-37148 EXPLOITDB LOW text
P5 FNIP-8x16A/FNIP-4xSH <1.0.20, 1.0.11 - XSS
P5 FNIP-8x16A/FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from a stored cross-site scripting vulnerability. Input passed to several GET/POST parameters is not properly sanitized before being returned to the user, allowing attackers to execute arbitrary HTML and script code in a user's browser session in the context of the affected site. This can be exploited by submitting crafted input to the label modification functionality, such as the 'lab4' parameter in config.html.
by LiquidWorm
CVSS 3.5
CVE-2020-37118 EXPLOITDB LOW text
P5 FNIP-8x16A FNIP-4xSH 1.0.20 - CSRF
P5 FNIP-8x16A FNIP-4xSH 1.0.20 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user interaction. Attackers can craft malicious web pages to add new admin users, change passwords, and modify system configurations by tricking authenticated users into loading a specially crafted page.
by LiquidWorm
CVSS 3.5
CVE-2020-37117 EXPLOITDB HIGH text
jizhiCMS 1.6.7 - File Download
jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.
by jizhicms
CVSS 8.8
CVE-2020-37105 EXPLOITDB HIGH text
PMB 5.6 - SQL Injection
PMB 5.6 contains a SQL injection vulnerability in the administration download script that allows authenticated attackers to execute arbitrary SQL commands through the 'logid' parameter. Attackers can leverage this vulnerability by sending crafted requests to the /admin/sauvegarde/download.php endpoint with manipulated logid values to interact with the database.
by 41-trk
CVSS 7.1