Text Exploits

31,341 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-16693 EXPLOITDB CRITICAL text
phpIPAM 1.4 - SQL Injection
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/order.php table parameter when action=add is used.
by CodeSecLab
CVSS 9.8
CVE-2021-40617 EXPLOITDB CRITICAL text
openSIS CE <8.0 - SQL Injection
An SQL Injection vulnerability exists in openSIS Community Edition version 8.0 via ForgotPassUserName.php.
by CodeSecLab
CVSS 9.8
CVE-2019-25024 EXPLOITDB CRITICAL text
OpenRepeater <2.2 - Command Injection
OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.
by CodeSecLab
CVSS 9.8
CVE-2018-25080 EXPLOITDB LOW text
MobileDetect <2.8.31 - XSS
A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The identifier of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.
by CodeSecLab
CVSS 3.5
CVE-2017-6478 EXPLOITDB MEDIUM text
Mangoswebv4 < 4.0.8 - XSS
paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (step parameter).
by CodeSecLab
CVSS 6.1
CVE-2023-33362 EXPLOITDB CRITICAL text
Piwigo 13.6.0 - SQL Injection
Piwigo 13.6.0 is vulnerable to SQL Injection via in the "profile" function.
by CodeSecLab
CVSS 9.8
CVE-2024-41357 EXPLOITDB HIGH text
Phpipam - XSS
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/powerDNS/record-edit.php.
by CodeSecLab
CVSS 7.1
CVE-2024-41358 EXPLOITDB MEDIUM text
Phpipam - XSS
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\import-export\import-load-data.php.
by CodeSecLab
CVSS 6.1
CVE-2023-1211 EXPLOITDB HIGH text
Phpipam < 1.5.2 - SQL Injection
SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2.
by CodeSecLab
CVSS 7.2
CVE-2022-0088 EXPLOITDB HIGH text
Yourls < 1.8.3 - CSRF
Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3.
by CodeSecLab
CVSS 7.4
CVE-2022-3766 EXPLOITDB MEDIUM text
Phpmyfaq < 3.1.8 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.8.
by CodeSecLab
CVSS 6.1
CVE-2023-34927 EXPLOITDB MEDIUM text
Casbin Casdoor < 1.331.0 - CSRF
Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.
by Van Lam Nguyen
CVSS 6.5
CVE-2025-24893 EXPLOITDB CRITICAL text
XWiki Platform - Remote Code Execution
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed.
by Maksim Rogov
CVSS 9.8
CVE-2025-57642 EXPLOITDB HIGH text
Sohamjuhin Tourism Management System - Unrestricted File Upload
A Shell Upload vulnerability in Tourism Management System 2.0 allows an attacker to upload and execute arbitrary PHP shell scripts on the server, leading to remote code execution and unauthorized access to the system. This can result in the compromise of sensitive data and system functionality.
by Debug Security
CVSS 7.2
CVE-2025-8573 EXPLOITDB MEDIUM text
Concretecms Concrete Cms < 9.4.3 - XSS
Concrete CMS versions 9 through 9.4.2 are vulnerable to Stored XSS from Home Folder on Members Dashboard page.  Version 8 was not affected. A rogue admin could set up a malicious folder containing XSS to which users could be directed upon login. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.0 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Thanks sealldev  (Noah Cooper) for reporting via HackerOne.
by Chokri Hammedi
CVSS 4.8
CVE-2023-34927 EXPLOITDB MEDIUM text
Casbin Casdoor < 1.331.0 - CSRF
Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.
by Van Lam Nguyen
CVSS 6.5
CVE-2025-55911 EXPLOITDB MEDIUM text
Clip Bucket <5.5.2 - RCE
An issue Clip Bucket v.5.5.2 Build#90 allows a remote attacker to execute arbitrary codes via the file_downloader.php and the file parameter
by Mukundsinh Solanki (r00td3str0y3r)
CVSS 6.5
CVE-2025-55912 EXPLOITDB HIGH text
ClipBucket <5.5.0 - Unauthenticated File Upload
An issue in ClipBucket 5.5.0 and prior versions allows an unauthenticated attacker can exploit the plupload endpoint in photo_uploader.php to upload arbitrary files without any authentication, due to missing access controls in the upload handler
by Mukundsinh Solanki (r00td3str0y3r)
CVSS 7.3
CVE-2025-26264 EXPLOITDB HIGH text
GeoVision GV-ASWeb <6.2.0 - RCE
GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.
by Giorgi Dograshvili
CVSS 8.8
CVE-2025-26263 EXPLOITDB MEDIUM text
GeoVision ASManager <6.2.0 - Info Disclosure
GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less (fixed in 6.2.0), is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process.
by Giorgi Dograshvili
CVSS 5.1
CVE-2025-9140 EXPLOITDB MEDIUM text
51mis Lingdang Crm < 8.6.5.4 - Injection
A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+."
by Beatriz Fresno Naumova
CVSS 6.3
CVE-2025-50154 EXPLOITDB MEDIUM text
Windows File Explorer - Info Disclosure
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
by Ruben Enkaoua
CVSS 6.5
CVE-2025-52392 EXPLOITDB MEDIUM text
Soosyze - Brute Force
Soosyze CMS 2.0 allows brute-force login attacks via the /user/login endpoint due to missing rate-limiting and lockout mechanisms. An attacker can repeatedly submit login attempts without restrictions, potentially gaining unauthorized administrative access. This vulnerability corresponds to CWE-307: Improper Restriction of Excessive Authentication Attempts.
by Beatriz Fresno Naumova
CVSS 5.4
CVE-2024-28623 EXPLOITDB MEDIUM text
RiteCMS 3.0.0 - Cross-site Scripting
RiteCMS v3.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component main_menu/edit_section.
by Gurjot Singh
CVSS 6.1
CVE-2025-2783 EXPLOITDB HIGH text
Mojo in Google Chrome <134.0.6998.177 - RCE
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
by nu11secur1ty
CVSS 8.3