Text Exploits
31,329 exploits tracked across all sources.
PHPBack < 1.3.1 - SQL Injection / Cross-Site Scripting
by Manish Tanwar
Apple <10.2.1, <10.12.3, <10.1.1, <3.1.3 - RCE/DoS
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app.
by Google Security Research
CVSS 7.8
TM RG4332 Wireless Router - Arbitrary File Disclosure
by Saeid Atabaki
Google Android - 'pm_qos' KASLR Bypass
by Google Security Research
Itech Movie Portal Script 7.36 - SQL Injection
A vulnerability, which was classified as critical, has been found in Itech Movie Portal Script 7.36. This issue affects some unknown processing of the file /film-rating.php. The manipulation of the argument v leads to sql injection (Error). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
by Marc Castejon
CVSS 6.3
Itech Movie Portal Script 7.36 - SQL Injection
A vulnerability classified as critical was found in Itech Movie Portal Script 7.36. This vulnerability affects unknown code of the file /artist-display.php. The manipulation of the argument act leads to sql injection (Union). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
by Marc Castejon
CVSS 6.3
Itech Movie Portal Script 7.36 - SQL Injection
A vulnerability classified as critical has been found in Itech Movie Portal Script 7.36. This affects an unknown part of the file /movie.php. The manipulation of the argument f leads to sql injection (Union). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
by Marc Castejon
CVSS 6.3
Itech Movie Portal Script 7.36 - XSS
A vulnerability was found in Itech Movie Portal Script 7.36. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /movie.php. The manipulation of the argument f with the input <img src=i onerror=prompt(1)> leads to basic cross site scripting (Reflected). The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
by Marc Castejon
CVSS 4.3
Itech Movie Portal Script 7.36 - SQL Injection
A vulnerability was found in Itech Movie Portal Script 7.36. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /show_news.php. The manipulation of the argument id with the input AND (SELECT 1222 FROM(SELECT COUNT(*),CONCAT(0x71786b7a71,(SELECT (ELT(1222=1222,1))),0x717a627871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) leads to sql injection (Error). The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
by Marc Castejon
CVSS 6.3
systemd <v229 - Privilege Escalation
A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
by Sebastian Krahmer
CVSS 7.8
GNU Screen 4.5.0 - Local Privilege Escalation (PoC)
by Donald Buczek
WD My Cloud Mirror 2.11.153 - Authentication Bypass / Remote Code Execution
by Kacper Szurek
Ntopng < 2.4 - CSRF
Cross-site request forgery (CSRF) vulnerability in ntopng through 2.4 allows remote attackers to hijack the authentication of arbitrary users, as demonstrated by admin/add_user.lua, admin/change_user_prefs.lua, admin/delete_user.lua, and admin/password_reset.lua.
by hyp3rlinx
CVSS 8.8
Microsoft Power Point 2016 - Java Code Execution
by Fady Mohammed Osman
ICTutors Tutoring Site Script 1.1 - Authentication Bypass
by Ihsan Sencan
ICGames-Games Site Script 1.2 - Authentication Bypass
by Ihsan Sencan
Domains Marketplace Script 1.1 - Authentication Bypass
by Ihsan Sencan
Complain Management System - SQL injection
by Sibusiso Sishi
By Source