Text Exploits

31,329 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-108745 EXPLOITDB text
Joomla! Component Joomloc-CAT 4.1.3 - 'ville' SQL Injection
by Ihsan Sencan
EIP-2026-108734 EXPLOITDB text
Joomla! Component JomWALL 4.0 - 'wuid' SQL Injection
by Ihsan Sencan
EIP-2026-108662 EXPLOITDB text
Joomla! Component Google Map Store Locator 4.4 - SQL Injection
by Ihsan Sencan
EIP-2026-108639 EXPLOITDB text
Joomla! Component EShop 2.5.1 - 'id' SQL Injection
by Ihsan Sencan
EIP-2026-108220 EXPLOITDB text
Joomla! Component Bazaar Platform 3.0 - SQL Injection
by Ihsan Sencan
EIP-2026-108899 EXPLOITDB text
Joomla! Component WMT Content Timeline 1.0 - 'id' SQL Injection
by Ihsan Sencan
EIP-2026-108880 EXPLOITDB text
Joomla! Component Team Display 1.2.1 - 'filter_category' SQL Injection
by Ihsan Sencan
EIP-2026-108664 EXPLOITDB text
Joomla! Component Groovy Gallery 1.0.0 - SQL Injection
by Ihsan Sencan
CVE-2017-6060 EXPLOITDB HIGH text VERIFIED
Artifex Mupdf - Out-of-Bounds Write
Stack-based buffer overflow in jstest_main.c in mujstest in Artifex Software, Inc. MuPDF 1.10a allows remote attackers to have unspecified impact via a crafted image.
by Agostino Sarubbo
CVSS 7.8
EIP-2026-113658 EXPLOITDB text VERIFIED
WordPress Plugin Corner Ad 1.0.7 - Cross-Site Scripting
by Atik Rahman
EIP-2026-108871 EXPLOITDB text
Joomla! Component Spider FAQ Lite 1.3.1 - SQL Injection
by Ihsan Sencan
EIP-2026-108869 EXPLOITDB text
Joomla! Component Spider Facebook 1.6.1 - SQL Injection
by Ihsan Sencan
EIP-2026-108867 EXPLOITDB text
Joomla! Component Spider Catalog Lite 1.8.10 - SQL Injection
by Ihsan Sencan
EIP-2026-108865 EXPLOITDB text
Joomla! Component Spider Calendar Lite 3.2.16 - SQL Injection
by Ihsan Sencan
EIP-2026-108721 EXPLOITDB text
Joomla! Component JEmbedAll 1.4 - SQL Injection
by Ihsan Sencan
CVE-2017-0312 EXPLOITDB HIGH text VERIFIED
Nvidia Gpu Driver - Improper Input Validation
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscapeID 0x100008b where user provided input is used as the limit for a loop may lead to denial of service or potential escalation of privileges
by Google Security Research
CVSS 7.8
CVE-2017-0313 EXPLOITDB HIGH text VERIFIED
Nvidia Gpu Driver - Memory Corruption
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) implementation of the SubmitCommandVirtual DDI (DxgkDdiSubmitCommandVirtual) where untrusted input is used to reference memory outside of the intended boundary of the buffer leading to denial of service or escalation of privileges.
by Google Security Research
CVSS 7.8
CVE-2017-0038 EXPLOITDB MEDIUM text VERIFIED
Microsoft Windows 10 - Information Disclosure
gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3216, CVE-2016-3219, and/or CVE-2016-3220.
by Google Security Research
CVSS 5.5
CVE-2017-5881 EXPLOITDB HIGH text VERIFIED
Gomlab Gom Player - Memory Corruption
GOM Player 2.3.10.5266 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted fpx file.
by Peter Baris
CVSS 7.8
EIP-2026-108764 EXPLOITDB text
Joomla! Component JSP Store Locator 2.2 - 'id' SQL Injection
by Ihsan Sencan
EIP-2026-108739 EXPLOITDB text
Joomla! Component JoomBlog 1.3.1 - SQL Injection
by Ihsan Sencan
EIP-2026-106157 EXPLOITDB text
Coppermine Gallery < 1.5.44 - Directory Traversal
by Hacker Fantastic
CVE-2017-3807 EXPLOITDB HIGH text VERIFIED
Cisco ASA <9.7 - Heap Overflow
A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838.
by Google Security Research
CVSS 8.8
CVE-2017-0358 EXPLOITDB HIGH text VERIFIED
Debian/Ubuntu ntfs-3g Local Privilege Escalation
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
by Google Security Research
CVSS 7.8
EIP-2026-100035 EXPLOITDB text VERIFIED
LG G4 - Touchscreen Driver write_log Kernel Read/Write
by Google Security Research