Text Exploits

31,364 exploits tracked across all sources.

Sort: Activity Stars
CVE-2018-5370 EXPLOITDB MEDIUM text
BizLogic xnami 1.0 - XSS
BizLogic xnami 1.0 has XSS via the comment parameter in an addComment action to the /media/ajax URI.
by Dennis Veninga
CVSS 6.1
EIP-2026-112565 EXPLOITDB text
Taxi Booking Script 1.0 - Cross-site Scripting
by Tauco
CVE-2018-0749 EXPLOITDB HIGH text VERIFIED
Windows - Privilege Escalation
The Microsoft Server Message Block (SMB) Server in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way SMB Server handles specially crafted files, aka "Windows Elevation of Privilege Vulnerability".
by Google Security Research
CVSS 7.8
CVE-2018-0752 EXPLOITDB HIGH text VERIFIED
Microsoft Windows 10 - Incorrect Permission Assignment
The Windows Kernel API in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way the Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2018-0751.
by Google Security Research
CVSS 7.8
CVE-2018-0751 EXPLOITDB HIGH text VERIFIED
Microsoft Windows 10 - Improper Privilege Management
The Windows Kernel API in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way the Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2018-0752.
by Google Security Research
CVSS 7.1
CVE-2017-13209 EXPLOITDB HIGH text VERIFIED
Google Android - Missing Authorization
In the ServiceManager::add function in the hardware service manager, there is an insecure permissions check based on the PID of the caller which could allow an application or service to replace a HAL service with its own service. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-68217907.
by Google Security Research
CVSS 7.8
EIP-2026-114199 EXPLOITDB text
WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery
by Panagiotis Vagenas
EIP-2026-114071 EXPLOITDB text
WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery
by Panagiotis Vagenas
EIP-2026-114034 EXPLOITDB text
WordPress Plugin Service Finder Booking < 3.2 - Local File Disclosure
by telahdihapus
CVE-2018-5315 EXPLOITDB CRITICAL text
Wachipi WP Events Calendar <1.0 - SQL Injection
The Wachipi WP Events Calendar plugin 1.0 for WordPress has SQL Injection via the event_id parameter to event.php.
by Dennis Veninga
CVSS 9.8
EIP-2026-113632 EXPLOITDB text
WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation
by Panagiotis Vagenas
EIP-2026-113537 EXPLOITDB text
WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation
by Panagiotis Vagenas
CVE-2017-17970 EXPLOITDB CRITICAL text
Muviko - SQL Injection
Multiple SQL injection vulnerabilities in Muviko 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to login.php; the (2) season_id parameter to themes/flixer/ajax/load_season.php; the (3) movie_id parameter to themes/flixer/ajax/get_rating.php; the (4) rating or (5) movie_id parameter to themes/flixer/ajax/update_rating.php; or the (6) id parameter to themes/flixer/ajax/set_player_source.php.
by Ahmad Mahfouz
CVSS 9.8
CVE-2018-5263 EXPLOITDB MEDIUM text VERIFIED
Joomla! - com_easydiscuss <4.0.21 - XSS
The StackIdeas EasyDiscuss (aka com_easydiscuss) extension before 4.0.21 for Joomla! allows XSS.
by Mattia Furlani
CVSS 5.4
CVE-2017-18016 EXPLOITDB MEDIUM text
Parity Browser - Origin Validation Error
Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).
by tintinweb
CVSS 5.3
EIP-2026-101048 EXPLOITDB text VERIFIED
Multiple CPUs - Information Leak Using Speculative Execution
by Google Security Research
EIP-2026-117533 EXPLOITDB text VERIFIED
Microsoft Windows - Local XPS Print Spooler Sandbox Escape
by Google Security Research
EIP-2026-114978 EXPLOITDB text
BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow (PoC)
by hyp3rlinx
EIP-2026-113863 EXPLOITDB text
WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload
by NinTechNet
EIP-2026-112533 EXPLOITDB text
Synology Photostation < 6.7.2-3429 - Multiple Vulnerabilities
by GulfTech Security
EIP-2026-102280 EXPLOITDB text
Photos in Wifi 1.0.1 - Path Traversal
by Vulnerability-Lab
EIP-2026-102017 EXPLOITDB text
SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities
by Vulnerability-Lab
CVE-2017-9554 EXPLOITDB MEDIUM text
Synology DSM <6.1.3-15152 - Info Disclosure
An information exposure vulnerability in forget_passwd.cgi in Synology DiskStation Manager (DSM) before 6.1.3-15152 allows remote attackers to enumerate valid usernames via unspecified vectors.
by Steve Kaun
CVSS 5.3
CVE-2017-13216 EXPLOITDB HIGH text VERIFIED
Google Android - Out-of-Bounds Write
In ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-66954097.
by Google Security Research
CVSS 7.8
CVE-2017-17097 EXPLOITDB CRITICAL text
GPS Tracking Software 2.x - Info Disclosure
gps-server.net GPS Tracking Software (self hosted) 2.x has a password reset procedure that immediately resets passwords upon an unauthenticated request, and then sends e-mail with a predictable (date-based) password to the admin, which makes it easier for remote attackers to obtain access by predicting this new password. This is related to the use of gmdate for password creation in fn_connect.php.
by Noman Riffat
CVSS 9.8