Text Exploits
31,329 exploits tracked across all sources.
Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting
by LiquidWorm
Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery (Enable SSH Root Access)
by LiquidWorm
Yaws - Path Traversal
Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080. NOTE: this CVE is only about use of an initial /%5C sequence to defeat traversal protection mechanisms; the initial /%5C sequence was apparently not discussed in earlier research on this product.
by hyp3rlinx
CVSS 7.5
LibTIFF 4.0.7 - DoS
LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash) via a crafted TIFF file.
by zhangtan
CVSS 6.5
Libtiff - Resource Leak
In LibTIFF 4.0.8, there is a memory leak in tif_jbig.c. A crafted TIFF document can lead to a memory leak resulting in a remote denial of service attack.
by team OWL337
CVSS 6.5
Libtiff - Improper Input Validation
In LibTIFF 4.0.8, there is a assertion abort in the TIFFWriteDirectoryTagCheckedLong8Array function in tif_dirwrite.c. A crafted input will lead to a remote denial of service attack.
by team OWL337
CVSS 7.5
WatuPRO <5.5.3.7 - SQL Injection
SQL injection vulnerability in the WatuPRO plugin before 5.5.3.7 for WordPress allows remote attackers to execute arbitrary SQL commands via the watupro_questions parameter in a watupro_submit action to wp-admin/admin-ajax.php.
by Manich Koomsusi
CVSS 9.8
OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
by Jonatas Fil
Google Chrome - Out-of-Bounds Access in RegExp Stubs
by Google Security Research
eVestigator Forensic PenTester - Man In The Middle Remote Code Execution
by intern0t
BestSafe Browser - Man In The Middle Remote Code Execution
by intern0t
LG MRA58K - 'ASFParser::SetMetaData' Stack Overflow
by Google Security Research
Kaspersky Anti-virus For Linux Server < 8.0.3.297 - Information Disclosure
The reportId parameter of the getReportStatus action method can be abused in the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312) to read arbitrary files with kluser privileges.
by Core Security
CVSS 7.5
Kaspersky Anti-virus For Linux Server < 8.0.3.297 - Improper Input Validation
The kluser is able to interact with the kav4fs-control binary in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). By abusing the quarantine read and write operations, it is possible to elevate the privileges to root.
by Core Security
CVSS 9.8
Kaspersky Anti-Virus for Linux File Server <8.0.4.312 - CSRF
There are no Anti-CSRF tokens in any forms on the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). This would allow an attacker to submit authenticated requests when an authenticated user browses an attacker-controlled domain.
by Core Security
CVSS 8.8
Kaspersky Anti-Virus for Linux File Server <8.0.4.312 - XSS
In Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312), the scriptName parameter of the licenseKeyInfo action method is vulnerable to cross-site scripting (XSS).
by Core Security
CVSS 6.1
Microsoft Windows Defender - Memory Corruption
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on 32-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703 does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability".
by Google Security Research
CVSS 7.8
WordPress Plugin Ultimate Product Catalogue 4.2.2 - SQL Injection
by Lenon Leite
Glpi - SQL Injection
Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding.
by Eric CARTER
CVSS 7.5
LAME <3.99.5 - DoS
The II_step_one function in layer2.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.
by Agostino Sarubbo
CVSS 5.5
LAME 3.99.5 - DoS
The III_dequantize_sample function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
by Agostino Sarubbo
CVSS 7.8
By Source