Text Exploits

31,346 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-5526 EXPLOITDB HIGH text VERIFIED
Vmware Workstation < 15.1.0 - Uncontrolled Search Path
VMware Workstation (15.x before 15.1.0) contains a DLL hijacking issue because some DLL files are improperly loaded by the application. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to administrator on a windows host where Workstation is installed.
by Miguel Mendez Z. & Claudio Cortes C.
CVSS 7.8
EIP-2026-106400 EXPLOITDB text
DeepSound 1.0.4 - SQL Injection
by Mehmet EMIROGLU
CVE-2019-11419 EXPLOITDB MEDIUM text
WeChat <7.0.3 - DoS
vcodec2_hls_filter in libvoipCodec_v7a.so in the WeChat application through 7.0.3 for Android allows attackers to cause a denial of service (application crash) by replacing an emoji file (under the /sdcard/tencent/MicroMsg directory) with a crafted .wxgf file. The content of the replacement must be derived from the phone's IMEI. The crash occurs upon receiving a message that contains the replaced emoji.
by Hong Nhat Pham
CVSS 5.5
CVE-2019-25244 EXPLOITDB MEDIUM text
Legrand BTicino Driver Manager F454 1.0.51 - CSRF, XSS
Legrand BTicino Driver Manager F454 1.0.51 contains multiple web vulnerabilities that allow attackers to perform administrative actions without proper request validation. Attackers can exploit cross-site request forgery to change passwords and inject stored cross-site scripting payloads through unvalidated GET parameters.
by LiquidWorm
CVSS 5.3
CVE-2019-0803 EXPLOITDB HIGH text
Windows - Privilege Escalation
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859.
by Arch-Vile
CVSS 7.8
EIP-2026-106086 EXPLOITDB text
CommSy 8.6.5 - SQL injection
by Jens Regel
CVE-2019-20501 EXPLOITDB HIGH text
Dlink Dwl-2600ap Firmware < 4.2.0.15 - OS Command Injection
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Upgrade Firmware functionality in the Web interface, using shell metacharacters in the admin.cgi?action=upgrade firmwareRestore or firmwareServerip parameter.
by Raki Ben Hamouda
CVSS 7.8
CVE-2019-20500 EXPLOITDB HIGH text
Dlink Dwl-2600ap Firmware < 4.2.0.15 - OS Command Injection
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.
by Raki Ben Hamouda
CVSS 7.8
CVE-2018-7841 EXPLOITDB CRITICAL text
U.motion Builder <1.3.4 - SQL Injection
A SQL Injection (CWE-89) vulnerability exists in U.motion Builder software version 1.3.4 which could cause unwanted code execution when an improper set of characters is entered.
by Julien Ahrens
CVSS 9.8
EIP-2026-111877 EXPLOITDB text
Sales ERP 8.1 - Multiple SQL Injection
by Mehmet EMIROGLU
EIP-2026-110489 EXPLOITDB text
PasteShr 1.6 - Multiple SQL Injection
by Mehmet EMIROGLU
CVE-2019-20499 EXPLOITDB HIGH text
Dlink Dwl-2600ap Firmware < 4.2.0.15 - OS Command Injection
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Restore Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_restore configRestore or configServerip parameter.
by Raki Ben Hamouda
CVSS 7.8
CVE-2019-25433 EXPLOITDB HIGH text
XOOPS CMS 2.5.9 - SQL Injection
XOOPS CMS 2.5.9 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cid parameter. Attackers can send GET requests to the gerar_pdf.php endpoint with malicious cid values to extract sensitive database information.
by felipe andrian
CVSS 8.2
CVE-2018-25129 EXPLOITDB HIGH text
SOCA Access Control System 180612 - Info Disclosure
SOCA Access Control System 180612 contains multiple insecure direct object reference vulnerabilities that allow attackers to access sensitive user credentials. Attackers can retrieve authenticated and unauthenticated user password hashes and pins through unprotected endpoints like Get_Permissions_From_DB.php and Ac10_ReadSortCard.
by LiquidWorm
CVSS 7.5
CVE-2018-25128 EXPLOITDB HIGH text
SOCA Access Control System 180612 - SQL Injection
SOCA Access Control System 180612 contains multiple SQL injection vulnerabilities that allow attackers to manipulate database queries through unvalidated POST parameters. Attackers can bypass authentication, retrieve password hashes, and gain administrative access with full system privileges by exploiting injection flaws in Login.php and Card_Edit_GetJson.php.
by LiquidWorm
CVSS 8.2
CVE-2018-25127 EXPLOITDB MEDIUM text
SOCA Access Control System - CSRF
SOCA Access Control System 180612 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without proper request validation. Attackers can craft malicious web pages that submit forged requests to create admin accounts by tricking logged-in users into visiting a malicious site.
by LiquidWorm
CVSS 5.3
CVE-2019-11600 EXPLOITDB HIGH text VERIFIED
OpenProject <8.3.2 - SQL Injection
A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access.
by SEC Consult
CVSS 8.1
CVE-2019-7442 EXPLOITDB CRITICAL text
CyberArk Enterprise Password Vault <=10.7 - XXE
An XML external entity (XXE) vulnerability in the Password Vault Web Access (PVWA) of CyberArk Enterprise Password Vault <=10.7 allows remote attackers to read arbitrary files or potentially bypass authentication via a crafted DTD in the SAML authentication system.
by Marcelo Toran
CVSS 9.8
CVE-2019-7652 EXPLOITDB HIGH text VERIFIED
TheHive Project UnshortenLink analyzer <1.1 - SSRF
TheHive Project UnshortenLink analyzer before 1.1, included in Cortex-Analyzers before 1.15.2, has SSRF. To exploit the vulnerability, an attacker must create a new analysis, select URL for Data Type, and provide an SSRF payload like "http://127.0.0.1:22" in the Data parameter. The result can be seen in the main dashboard. Thus, it is possible to do port scans on localhost and intranet hosts.
by Alexandre Basquin
CVSS 7.7
EIP-2026-102479 EXPLOITDB text
dotCMS 5.1.1 - HTML Injection
by Ismail Tasdelen
EIP-2026-101957 EXPLOITDB text
RICOH SP 4520DN Printer - HTML Injection
by Ismail Tasdelen
EIP-2026-101955 EXPLOITDB text
RICOH SP 4510DN Printer - HTML Injection
by Ismail Tasdelen
CVE-2018-20485 EXPLOITDB MEDIUM text
Zohocorp Manageengine Adselfservice Plus - XSS
Zoho ManageEngine ADSelfService Plus 5.7 before build 5702 has XSS in the employee search feature.
by Ibrahim Raafat
CVSS 6.1
CVE-2019-25611 EXPLOITDB HIGH text
MiniFtp parseconf_load_setting Buffer Overflow via Configuration
MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function that allows local attackers to execute arbitrary code by supplying oversized configuration values. Attackers can craft a miniftpd.conf file with values exceeding 128 bytes to overflow stack buffers and overwrite the return address, enabling code execution with root privileges.
by strider
CVSS 8.4
CVE-2019-25610 EXPLOITDB MEDIUM text
NetNumber Titan Master 7.9.1 Path Traversal via drp
NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp endpoint that allows authenticated users to download arbitrary files by injecting directory traversal sequences. Attackers can manipulate the path parameter with base64-encoded payloads containing ../ sequences to bypass authorization and retrieve sensitive system files like /etc/shadow.
by MobileNetworkSecurity
CVSS 6.5