Text Exploits

31,341 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-34635 EXPLOITDB CRITICAL text
Wifi-soft Unibox Administration - SQL Injection
Wifi Soft Unibox Administration 3.0 and 3.1 is vulnerable to SQL Injection. The vulnerability occurs because of not validating or sanitizing the user input in the username field of the login page.
by Ansh Jain
CVSS 9.8
EIP-2026-113312 EXPLOITDB text
Webile v1.0.1 - Multiple Cross Site Scripting
by Vulnerability-Lab
EIP-2026-110495 EXPLOITDB text
PaulPrinting CMS - Multiple Cross Site Web Vulnerabilities
by Vulnerability-Lab
EIP-2026-110494 EXPLOITDB text
PaulPrinting CMS - (Search Delivery) Cross Site Scripting
by Vulnerability-Lab
EIP-2026-106540 EXPLOITDB text
Dooblou WiFi File Explorer 1.13.3 - Multiple Vulnerabilities
by Vulnerability-Lab
EIP-2026-105593 EXPLOITDB text
Boom CMS v8.0.7 - Cross Site Scripting
by Vulnerability-Lab
EIP-2026-105301 EXPLOITDB text
Aures Booking & POS Terminal - Local Privilege Escalation
by Vulnerability-Lab
EIP-2026-104923 EXPLOITDB text
Active Super Shop CMS v2.5 - HTML Injection Vulnerabilities
by Vulnerability-Lab
CVE-2023-38357 EXPLOITDB MEDIUM text
RWS WorldServer <11.7.3 - Info Disclosure
Session tokens in RWS WorldServer 11.7.3 and earlier have a low entropy and can be enumerated, leading to unauthorized access to user sessions.
by RedTeam Pentesting GmbH
CVSS 5.3
CVE-2023-33148 EXPLOITDB HIGH text
Microsoft Office - Privilege Escalation
Microsoft Office Elevation of Privilege Vulnerability
by nu11secur1ty
CVSS 7.8
CVE-2023-53892 EXPLOITDB HIGH text
Blackcat CMS 1.4 - RCE
Blackcat CMS 1.4 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the jquery plugin manager. Attackers can upload a zip file with a PHP shell script and execute arbitrary system commands by accessing the uploaded plugin's PHP file with a 'code' parameter.
by Mirabbas Ağalarov
CVSS 7.2
CVE-2023-53891 EXPLOITDB MEDIUM text
Blackcat CMS 1.4 - XSS
Blackcat CMS 1.4 contains a stored cross-site scripting vulnerability that allows authenticated users to inject malicious scripts into page content. Attackers can insert JavaScript payloads in the page modification interface that execute when other users view the compromised page.
by Mirabbas Ağalarov
CVSS 5.4
EIP-2026-112946 EXPLOITDB text VERIFIED
Vaidya-Mitra 1.0 - Multiple SQLi
by nu11secur1ty
EIP-2026-112425 EXPLOITDB text
Statamic 4.7.0 - File-Inclusion
by nu11secur1ty
EIP-2026-106027 EXPLOITDB text
CmsMadeSimple v2.2.17 - Stored Cross-Site Scripting (XSS)
by Mirabbas Ağalarov
EIP-2026-106026 EXPLOITDB text
CmsMadeSimple v2.2.17 - session hijacking via Server-Side Template Injection (SSTI)
by Mirabbas Ağalarov
EIP-2026-106025 EXPLOITDB text
CmsMadeSimple v2.2.17 - Remote Code Execution (RCE)
by Mirabbas Ağalarov
EIP-2026-105376 EXPLOITDB text
Backdrop Cms v1.25.1 - Stored Cross-Site Scripting (XSS)
by Mirabbas Ağalarov
EIP-2026-102068 EXPLOITDB text
TP-Link TL-WR740N - Authenticated Directory Transversal
by Anish Feroz
EIP-2026-118174 EXPLOITDB text
XAMPP 8.2.4 - Unquoted Path
by Andrey Stoykov
CVE-2023-37269 EXPLOITDB LOW text
Winter < 1.2.3 - XSS
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Users with the `backend.manage_branding` permission can upload SVGs as the application logo. Prior to version 1.2.3, SVG uploads were not sanitized, which could have allowed a stored cross-site scripting (XSS) attack. To exploit the vulnerability, an attacker would already need to have developer or super user level permissions in Winter CMS. This means they would already have extensive access and control within the system. Additionally, to execute the XSS, the attacker would need to convince the victim to directly visit the URL of the maliciously uploaded SVG, and the application would have to be using local storage where uploaded files are served under the same domain as the application itself instead of a CDN. This is because all SVGs in Winter CMS are rendered through an `img` tag, which prevents any payloads from being executed directly. These two factors significantly limit the potential harm of this vulnerability. This issue has been patched in v1.2.3 through the inclusion of full support for SVG uploads and automatic sanitization of uploaded SVG files. As a workaround, one may apply the patches manually.
by abhishek morla
CVSS 2.0
EIP-2026-111545 EXPLOITDB text
ProjeQtOr Project Management System v10.4.1 - Multiple XSS
by Mirabbas Ağalarov
EIP-2026-109908 EXPLOITDB text VERIFIED
News Portal v4.0 - SQL Injection (Unauthorized)
by Hubert Wojciechowski
EIP-2026-104956 EXPLOITDB text
Admidio v4.2.10 - Remote Code Execution (RCE)
by Mirabbas Ağalarov
CVE-2019-1937 EXPLOITDB CRITICAL text
Cisco UCS Director Unauthenticated Remote Code Execution
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.
by Fatih Sencer
CVSS 9.8