Text Exploits

31,346 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-25133 EXPLOITDB MEDIUM text
Synaccess netBooter NP-0801DU 7.4 - CSRF
Synaccess netBooter NP-0801DU 7.4 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without proper request validation. Attackers can craft malicious web pages with hidden form submissions to add admin users by tricking authenticated administrators into loading a malicious page.
by LiquidWorm
CVSS 4.3
EIP-2026-114311 EXPLOITDB text
WordPress Theme CherryFramework 3.1.4 - Backup File Download
by b1p0l4r
EIP-2026-112671 EXPLOITDB text
Ticketly 1.0 - 'name' SQL Injection
by Javier Olmedo
CVE-2018-18922 EXPLOITDB CRITICAL text
AbiSoft Ticketly 1.0 - RCE
add_user in AbiSoft Ticketly 1.0 allows remote attackers to create administrator accounts via an action/add_user.php POST request.
by Javier Olmedo
CVSS 9.8
CVE-2018-8550 EXPLOITDB HIGH text VERIFIED
Windows COM Aggregate Marshaler - Privilege Escalation
An elevation of privilege exists in Windows COM Aggregate Marshaler, aka "Windows COM Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
by Google Security Research
CVSS 7.8
CVE-2018-25161 EXPLOITDB HIGH text
Warranty Tracking System 11.06.3 - SQL Injection
Warranty Tracking System 11.06.3 contains an SQL injection vulnerability that allows attackers to execute arbitrary SQL queries by injecting malicious code through the txtCustomerCode, txtCustomerName, and txtPhone POST parameters in SearchCustomer.php. Attackers can submit crafted SQL statements using UNION SELECT to extract sensitive database information including usernames, database names, and version details.
by Ihsan Sencan
CVSS 8.2
EIP-2026-119584 EXPLOITDB text
Easy Outlook Express Recovery 2.0 - Denial of Service (PoC)
by Ihsan Sencan
EIP-2026-107583 EXPLOITDB text
Helpdezk 1.1.1 - Arbitrary File Upload
by Ihsan Sencan
CVE-2018-19136 EXPLOITDB MEDIUM text
Domainmod < 4.11.01 - XSS
DomainMOD through 4.11.01 has XSS via the assets/edit/registrar-account.php raid parameter.
by Dawood Ansar
CVSS 6.1
CVE-2018-18955 EXPLOITDB HIGH text VERIFIED
Linux Nested User Namespace idmap Limit Local Privilege Escalation
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the namespace, as demonstrated by reading /etc/shadow. This occurs because an ID transformation takes place properly for the namespaced-to-kernel direction but not for the kernel-to-namespaced direction.
by Google Security Research
CVSS 7.0
CVE-2018-25168 EXPLOITDB MEDIUM text
Precurio Intranet Portal 2.0 - CSRF
Precurio Intranet Portal 2.0 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative user accounts by submitting crafted POST requests. Attackers can forge requests to the /public/admin/user/submitnew endpoint with user creation parameters to add new admin accounts without requiring CSRF tokens or user interaction.
by Ihsan Sencan
CVSS 4.3
CVE-2018-25167 EXPLOITDB HIGH text
Net-Billetterie 2.9 - SQL Injection
Net-Billetterie 2.9 contains an SQL injection vulnerability in the login parameter of login.inc.php that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit malicious SQL code through the login POST parameter to extract database information including usernames, passwords, and system credentials.
by Ihsan Sencan
CVSS 8.2
CVE-2018-25166 EXPLOITDB HIGH text
Meneame English Pligg 5.8 - SQL Injection
Meneame English Pligg 5.8 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the search parameter. Attackers can send GET requests to index.php with crafted SQL payloads in the search parameter to extract sensitive database information including usernames, database names, and version details.
by Ihsan Sencan
CVSS 8.2
CVE-2018-25165 EXPLOITDB HIGH text
Galaxy Forces MMORPG 0.5.8 - SQL Injection
Galaxy Forces MMORPG 0.5.8 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'type' parameter. Attackers can send POST requests to ads.php with crafted SQL payloads in the type parameter to extract sensitive database information including usernames, databases, and version details.
by Ihsan Sencan
CVSS 7.1
CVE-2018-25164 EXPLOITDB HIGH text
EverSync 0.5 - Info Disclosure
EverSync 0.5 contains an arbitrary file download vulnerability that allows unauthenticated attackers to access sensitive files by requesting them directly from the files directory. Attackers can send GET requests to the files directory to download database files like db.sq3 containing application data and credentials.
by Ihsan Sencan
CVSS 7.5
CVE-2018-25163 EXPLOITDB HIGH text
BitZoom 1.0 - SQL Injection
BitZoom 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the rollno and username parameters in forgot.php and login.php. Attackers can submit crafted POST requests with SQL UNION statements to extract database schema information and table contents from the application database.
by Ihsan Sencan
CVSS 8.2
CVE-2018-25162 EXPLOITDB MEDIUM text
2-Plan Team 1.0.4 - Authenticated RCE
2-Plan Team 1.0.4 contains an arbitrary file upload vulnerability that allows authenticated attackers to upload executable PHP files by sending multipart form data to managefile.php. Attackers can upload PHP files through the userfile1 parameter with action=upload, which are stored in the files directory and executed by the web server for remote code execution.
by Ihsan Sencan
CVSS 6.5
CVE-2018-19287 EXPLOITDB MEDIUM text
Ninja Forms <3.3.18 - XSS
XSS in the Ninja Forms plugin before 3.3.18 for WordPress allows Remote Attackers to execute JavaScript via the includes/Admin/Menus/Submissions.php (aka submissions page) begin_date, end_date, or form_id parameter.
by MTK
CVSS 6.1
EIP-2026-112089 EXPLOITDB text
Simple E-Document 1.31 - 'username' SQL Injection
by Ihsan Sencan
CVE-2018-19246 EXPLOITDB HIGH text
PHP-Proxy 5.1.0 - Info Disclosure
PHP-Proxy 5.1.0 allows remote attackers to read local files if the default "pre-installed version" (intended for users who lack shell access to their web server) is used. This occurs because the aeb067ca0aa9a3193dce3a7264c90187 app_key value from the default config.php is in place, and this value can be easily used to calculate the authorization data needed for local file inclusion.
by Ameer Pornillos
CVSS 7.5
EIP-2026-110722 EXPLOITDB text
PHP Mass Mail 1.0 - Arbitrary File Upload
by Ihsan Sencan
EIP-2026-109041 EXPLOITDB text
Kordil EDMS 2.2.60rc3 - Arbitrary File Upload
by Ihsan Sencan
CVE-2018-25173 EXPLOITDB HIGH text
Rmedia SMS 1.0 - SQL Injection
Rmedia SMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to extract database information by injecting SQL code through the gid parameter. Attackers can send GET requests to editgrp.php with malicious gid values using EXTRACTVALUE and CONCAT functions to retrieve schema names and sensitive database data.
by Ihsan Sencan
CVSS 8.2
CVE-2018-25172 EXPLOITDB HIGH text
Pedidos 1.0 - SQL Injection
Pedidos 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'q' parameter. Attackers can send GET requests to the ajax/load_proveedores.php endpoint with crafted SQL payloads to extract sensitive database information including schema names and table structures.
by Ihsan Sencan
CVSS 8.2
CVE-2018-25171 EXPLOITDB HIGH text
EdTv 2 - SQL Injection
EdTv 2 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to the admin/edit_source endpoint with crafted SQL UNION statements to extract database information including schema names, user credentials, and version details.
by Ihsan Sencan
CVSS 8.2