Text Exploits

31,368 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-6129 EXPLOITDB MEDIUM text VERIFIED
Google Chrome <67.0.3396.62 - Memory Corruption
Out of bounds array access in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
by Google Security Research
CVSS 6.5
CVE-2018-6130 EXPLOITDB MEDIUM text VERIFIED
Google Chrome <67.0.3396.62 - Memory Corruption
Incorrect handling of object lifetimes in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
by Google Security Research
CVSS 6.5
CVE-2018-11409 EXPLOITDB MEDIUM text
Splunk < 7.0.1 - Information Disclosure
Splunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.
by KoF2002
CVSS 5.3
CVE-2018-11544 EXPLOITDB CRITICAL text
Theolivetree FTP Server - Insufficiently Protected Credentials
The Olive Tree Ftp Server application 1.32 for Android has Insecure Data Storage because a username and password are stored in the /data/data/com.theolivetree.ftpserver/shared_prefs/com.theolivetree.ftpserver_preferences.xml file as the prefUsername and prefUserpass strings.
by ManhNho
CVSS 9.8
EIP-2026-113762 EXPLOITDB text
WordPress Plugin Form Maker 1.12.24 - SQL Injection
by defensecode
EIP-2026-113646 EXPLOITDB text
WordPress Plugin Contact Form Maker 1.12.20 - SQL Injection
by defensecode
EIP-2026-113178 EXPLOITDB text
WampServer 3.0.6 - Cross-Site Request Forgery
by L0RD
CVE-2018-7584 EXPLOITDB CRITICAL text VERIFIED
Php < 5.6.33 - Memory Corruption
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
by Wei Lei and Liu Yang
CVSS 9.8
CVE-2018-4241 EXPLOITDB HIGH text VERIFIED
Apple TV < 11.4 - Memory Corruption
An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "Kernel" component. A buffer overflow in mptcp_usr_connectx allows attackers to execute arbitrary code in a privileged context via a crafted app.
by Google Security Research
CVSS 7.8
CVE-2018-11715 EXPLOITDB MEDIUM text VERIFIED
Recent Threads < 1.1 - XSS
The Recent Threads plugin before 1.1 for MyBB allows XSS via a thread subject.
by 0xB9
CVSS 5.4
CVE-2018-11646 EXPLOITDB HIGH text
WebKitGTK+ <2.21.3 - Use After Free
webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.
by Dhiraj Mishra
CVSS 7.5
CVE-2018-11412 EXPLOITDB MEDIUM text
Linux Kernel < 4.16.11 - Use After Free
In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode.
by Google Security Research
CVSS 5.9
CVE-2018-11586 EXPLOITDB CRITICAL text
Searchblox - SSRF
XML external entity (XXE) vulnerability in api/rest/status in SearchBlox 8.6.7 allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.
by Ahmet Gurel
CVSS 9.8
CVE-2018-11628 EXPLOITDB MEDIUM text
Emssoftware Ems Master Calendar < 8.0.0.201805210 - XSS
Data input into EMS Master Calendar before 8.0.0.201805210 via URL parameters is not properly sanitized, allowing malicious attackers to send a crafted URL for XSS.
by Chris Barretto
CVSS 6.1
EIP-2026-112247 EXPLOITDB text
Smartshop 1 - 'id' SQL Injection
by L0RD
EIP-2026-103460 EXPLOITDB text
Epiphany 3.28.2.1 - Denial of Service
by Dhiraj Mishra
EIP-2026-110680 EXPLOITDB text
PHP Dashboards NEW 5.5 - 'email' SQL Injection
by Kağan Çapar
EIP-2026-109901 EXPLOITDB text
New STAR 2.1 - SQL Injection / Cross-Site Scripting
by Kağan Çapar
EIP-2026-107503 EXPLOITDB text
Grid Pro Big Data 1.0 - SQL Injection
by Kağan Çapar
EIP-2026-106257 EXPLOITDB text
CSV Import & Export 1.1.0 - SQL Injection / Cross-Site Scripting
by Kağan Çapar
EIP-2026-102032 EXPLOITDB text
TAC Xenta 511/911 - Directory Traversal
by Marek Cybul
CVE-2018-1123 EXPLOITDB LOW text
procps-ng <3.3.15 - DoS
procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
by Qualys Corporation
CVSS 3.9
CVE-2018-1122 EXPLOITDB HIGH text
procps-ng <3.3.15 - Privilege Escalation
procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
by Qualys Corporation
CVSS 7.3
CVE-2018-1121 EXPLOITDB LOW text
procps-ng - Privilege Escalation
procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also.
by Qualys Corporation
CVSS 3.9
CVE-2018-1120 EXPLOITDB LOW text
Linux kernel <4.17 - DoS
A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).
by Qualys Corporation
CVSS 2.8