Text Exploits

31,364 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-14757 EXPLOITDB HIGH text
OpenText Document Sciences xPression <4.5SP1 Patch 13 - SQL Injection
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to SQL Injection: /xDashboard/html/jobhistory/downloadSupportFile.action, parameter: jobRunId. In order for this vulnerability to be exploited, an attacker must authenticate to the application first.
by Marcin Woloszyn
CVSS 8.8
CVE-2017-14758 EXPLOITDB HIGH text
OpenText Document Sciences xPression v4.5SP1 Patch 13 - SQL Injection
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to SQL Injection: /xAdmin/html/cm_doclist_view_uc.jsp, parameter: documentId. In order for this vulnerability to be exploited, an attacker must authenticate to the application first.
by Marcin Woloszyn
CVSS 8.8
EIP-2026-101897 EXPLOITDB text
NPM-V (Network Power Manager) 2.4.1 - Password Reset
by Saeed reza Zamanian
EIP-2026-119543 EXPLOITDB text
Microsoft Word 2007 (x86) - Information Disclosure
by Eduardo Braun Prado
CVE-2017-0199 EXPLOITDB HIGH text
Microsoft Office Word Malicious Hta Execution
Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
by Eduardo Braun Prado
CVSS 7.8
CVE-2017-14848 EXPLOITDB HIGH text
WPHRM 1.0 - SQL Injection
WPHRM Human Resource Management System for WordPress 1.0 allows SQL Injection via the employee_id parameter.
by Ihsan Sencan
CVSS 8.8
CVE-2017-15956 EXPLOITDB HIGH text
Converto Video Downloader & Converter - Improper Input Validation
ConverTo Video Downloader & Converter 1.4.1 allows Arbitrary File Download via the token parameter to download.php.
by Ihsan Sencan
CVSS 7.5
CVE-2017-14086 EXPLOITDB HIGH text VERIFIED
Trend Micro OfficeScan 11.0 - Use After Free
Pre-authorization Start Remote Process vulnerabilities in Trend Micro OfficeScan 11.0 and XG may allow unauthenticated users who can access the OfficeScan server to start the fcgiOfcDDA.exe executable or cause a potential INI corruption, which may cause the server disk space to be consumed with dump files from continuous HTTP requests.
by hyp3rlinx
CVSS 7.5
CVE-2017-14084 EXPLOITDB HIGH text VERIFIED
Trend Micro OfficeScan <11.0 - RCE
A potential Man-in-the-Middle (MitM) attack vulnerability in Trend Micro OfficeScan 11.0 and XG may allow attackers to execute arbitrary code on vulnerable installations.
by hyp3rlinx
CVSS 8.1
EIP-2026-118027 EXPLOITDB text VERIFIED
Trend Micro OfficeScan 11.0/XG (12.0) - Image File Execution Bypass
by hyp3rlinx
EIP-2026-115745 EXPLOITDB text
Microsoft Office Groove - 'Workspace Shortcut' Arbitrary Code Execution
by Eduardo Braun Prado
EIP-2026-112791 EXPLOITDB text VERIFIED
Trend Micro OfficeScan 11.0/XG (12.0) - Server Side Request Forgery
by hyp3rlinx
CVE-2017-14083 EXPLOITDB HIGH text VERIFIED
Trend Micro OfficeScan 11.0 - Info Disclosure
A vulnerability in Trend Micro OfficeScan 11.0 and XG allows remote unauthenticated users who can access the system to download the OfficeScan encryption file.
by hyp3rlinx
CVSS 7.5
CVE-2017-14085 EXPLOITDB MEDIUM text VERIFIED
Trend Micro OfficeScan <11.0 - Info Disclosure
Information disclosure vulnerabilities in Trend Micro OfficeScan 11.0 and XG may allow unauthenticated users who can access the OfficeScan server to query the network's NT domain or the PHP version and modules.
by hyp3rlinx
CVSS 5.3
CVE-2017-14087 EXPLOITDB HIGH text VERIFIED
Trend Micro OfficeScan XG 12.0 - Host Header Injection
A Host Header Injection vulnerability in Trend Micro OfficeScan XG (12.0) may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages.
by hyp3rlinx
CVSS 7.5
EIP-2026-111706 EXPLOITDB text
Real Estate MLM plan script 1.0 - 'srch' SQL Injection
by 8bitsec
EIP-2026-110733 EXPLOITDB text
PHP Multi Vendor Script 1.02 - 'sid' SQL Injection
by 8bitsec
EIP-2026-106691 EXPLOITDB text
Easy Blog PHP Script 1.3a - 'id' SQL Injection
by 8bitsec
CVE-2017-18378 EXPLOITDB HIGH text
Netgear Readynas Surveillance Firmware < 1.1.4-7 - Command Injection
In NETGEAR ReadyNAS Surveillance before 1.4.3-17 x86 and before 1.1.4-7 ARM, $_GET['uploaddir'] is not escaped and is passed to system() through $tmp_upload_dir, leading to upgrade_handle.php?cmd=writeuploaddir remote command execution.
by Kacper Szurek
CVSS 8.4
CVE-2017-14620 EXPLOITDB MEDIUM text
SmarterStats <11.3.6347 - XSS
SmarterStats Version 11.3.6347 will Render the Referer Field of HTTP Logfiles from URL /Data/Reports/ReferringURLsWithQueries resulting in Stored Cross Site Scripting.
by sqlhacker
CVSS 6.1
CVE-2017-14844 EXPLOITDB HIGH text
Mojoomla WPGYM <WordPress> - SQL Injection
Mojoomla WPGYM WordPress Gym Management System allows SQL Injection via the id parameter.
by Ihsan Sencan
CVSS 8.8
CVE-2017-14845 EXPLOITDB HIGH text
Mojoomla WPCHURCH < - SQL Injection
Mojoomla WPCHURCH Church Management System for WordPress allows SQL Injection via the id parameter.
by Ihsan Sencan
CVSS 8.8
CVE-2017-14847 EXPLOITDB HIGH text
Dasinfomedia Mojoomla WPAMS Apartment Management System for WordPress - SQL Injection
Mojoomla WPAMS Apartment Management System for WordPress allows SQL Injection via the id parameter.
by Ihsan Sencan
CVSS 8.8
CVE-2017-14843 EXPLOITDB HIGH text
Mojoomla School Mgmt - SQL Injection
Mojoomla School Management System for WordPress allows SQL Injection via the id parameter.
by Ihsan Sencan
CVSS 8.8
CVE-2017-14846 EXPLOITDB HIGH text
Mojoomla Hospital Management System for WordPress - SQL Injection
Mojoomla Hospital Management System for WordPress allows SQL Injection via the id parameter.
by Ihsan Sencan
CVSS 8.8