Text Exploits

31,329 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-100034 EXPLOITDB text VERIFIED
LG G4 - lghashstorageserver Directory Traversal
by Google Security Research
EIP-2026-100033 EXPLOITDB text VERIFIED
LG G4 - lgdrmserver Binder Service Multiple Race Conditions
by Google Security Research
CVE-2017-0411 EXPLOITDB HIGH text VERIFIED
Google Android - TOCTOU Race Condition
An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 7.0, 7.1.1. Android ID: A-33042690.
by Google Security Research
CVSS 7.8
CVE-2017-0412 EXPLOITDB HIGH text VERIFIED
Google Android - TOCTOU Race Condition
An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 7.0, 7.1.1. Android ID: A-33039926.
by Google Security Research
CVSS 7.8
EIP-2026-110721 EXPLOITDB text
PHP Marketplace Script - SQL Injection
by Th3GundY
EIP-2026-108718 EXPLOITDB text
Joomla! Component JE Video Rate 1.0 - SQL Injection
by Ihsan Sencan
EIP-2026-108717 EXPLOITDB text
Joomla! Component JE Tour 2.0 - SQL Injection
by Ihsan Sencan
EIP-2026-108716 EXPLOITDB text
Joomla! Component JE Ticket System 1.2 - SQL Injection
by Ihsan Sencan
EIP-2026-108713 EXPLOITDB text
Joomla! Component JE QuoteForm - 'Itemid' SQL Injection
by Ihsan Sencan
EIP-2026-108712 EXPLOITDB text
Joomla! Component JE Quiz 2.3 - SQL Injection
by Ihsan Sencan
EIP-2026-108711 EXPLOITDB text
Joomla! Component JE Property Finder 1.6.3 - SQL Injection
by Ihsan Sencan
EIP-2026-108710 EXPLOITDB text
Joomla! Component JE Portfolio Creator 1.2 - 'd_itemid' SQL Injection
by Ihsan Sencan
EIP-2026-108706 EXPLOITDB text
Joomla! Component JE Messanger - SQL Injection
by Ihsan Sencan
EIP-2026-108704 EXPLOITDB text
Joomla! Component JE K2 Multiple Form Story 1.3 - 'Itemid' SQL Injection
by Ihsan Sencan
EIP-2026-108702 EXPLOITDB text
Joomla! Component JE Grid Folio - 'id' SQL Injection
by Ihsan Sencan
EIP-2026-108701 EXPLOITDB text
Joomla! Component JE Gallery 1.3 - 'photo_id' SQL Injection
by Ihsan Sencan
EIP-2026-108700 EXPLOITDB text
Joomla! Component JE Form Creator 1.8 - 'Itemid' SQL Injection
by Ihsan Sencan
EIP-2026-108699 EXPLOITDB text
Joomla! Component JE Directory 1.7 - 'ditemid' SQL Injection
by Ihsan Sencan
EIP-2026-108698 EXPLOITDB text
Joomla! Component JE Classify Ads 1.2 - 'pro_id' SQL Injection
by Ihsan Sencan
EIP-2026-108697 EXPLOITDB text
Joomla! Component JE Awd Song 1.8 - SQL Injection
by Ihsan Sencan
EIP-2026-108696 EXPLOITDB text
Joomla! Component JE Auto 1.5 - 'd_itemid' SQL Injection
by Ihsan Sencan
EIP-2026-108694 EXPLOITDB text
Joomla! Component JE auction 1.6 - 'eid' SQL Injection
by Ihsan Sencan
EIP-2026-108669 EXPLOITDB text
Joomla! Component Hbooking 1.9.9 - 'h_id' SQL Injection
by Ihsan Sencan
CVE-2017-5982 EXPLOITDB HIGH text VERIFIED
Kodi - Path Traversal
Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
by Eric Flokstra
CVSS 7.5
EIP-2026-116960 EXPLOITDB text
Cimetrics BACstac 6.2f - Local Privilege Escalation
by LiquidWorm