Text Exploits

31,330 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-100764 EXPLOITDB text
C2S DVR Management IRDOME-II-C2S / IRBOX-II-C2S / DVR - Credentials Disclosure / Authentication Bypass
by Yakir Wizman
CVE-2006-4904 EXPLOITDB text
Qualiteam X-Cart <4.1.3 - RCE
Dynamic variable evaluation vulnerability in cmpi.php in Qualiteam X-Cart 4.1.3 and earlier allows remote attackers to overwrite arbitrary program variables and execute arbitrary PHP code, as demonstrated by PHP remote file inclusion via the xcart_dir parameter.
by GulfTech Security
CVE-2016-6366 EXPLOITDB HIGH text
Cisco ASA Authentication Bypass (EXTRABACON)
Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
by Shadow Brokers
CVSS 8.8
EIP-2026-100812 EXPLOITDB text
Honeywell IP-Camera HICC-1100PT - Credentials Disclosure
by Yakir Wizman
CVE-2016-3303 EXPLOITDB HIGH text VERIFIED
Microsoft Live Meeting - Improper Input Validation
The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3304.
by Google Security Research
CVSS 7.8
CVE-2016-3304 EXPLOITDB HIGH text VERIFIED
Microsoft Live Meeting - Improper Input Validation
The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3303.
by Google Security Research
CVSS 7.8
CVE-2016-3301 EXPLOITDB HIGH text VERIFIED
Microsoft Live Meeting - Improper Input Validation
The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability."
by Google Security Research
CVSS 7.8
EIP-2026-100892 EXPLOITDB text
SIEMENS IP-Camera CVMS2025-IR / CCMS2025 - Credentials Disclosure
by Yakir Wizman
CVE-2016-4311 EXPLOITDB HIGH text VERIFIED
WSO2 Identity Server 5.1.0 - CSRF
Cross-site request forgery (CSRF) vulnerability in the XACML flow feature in WSO2 Identity Server 5.1.0 allows remote attackers to hijack the authentication of privileged users for requests that process XACML requests via an entitlement/eval-policy-submit.jsp request.
by hyp3rlinx
CVSS 8.8
EIP-2026-109821 EXPLOITDB text
Nagios Network Analyzer 2.2.0 - Multiple Vulnerabilities
by Security-Assessment.com
EIP-2026-109820 EXPLOITDB text
Nagios Log Server 1.4.1 - Multiple Vulnerabilities
by Security-Assessment.com
EIP-2026-109819 EXPLOITDB text
Nagios Incident Manager 2.0.0 - Multiple Vulnerabilities
by Security-Assessment.com
EIP-2026-109099 EXPLOITDB text
Lepton CMS 2.2.0/2.2.1 - PHP Code Injection
by hyp3rlinx
EIP-2026-109098 EXPLOITDB text
Lepton CMS 2.2.0/2.2.1 - Directory Traversal
by hyp3rlinx
CVE-2016-3316 EXPLOITDB HIGH text VERIFIED
Microsoft Word - Memory Corruption
Microsoft Word 2013 SP1, 2013 RT SP1, 2016, and 2016 for Mac allow remote attackers to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability."
by COSIG
CVSS 7.8
EIP-2026-103311 EXPLOITDB text VERIFIED
Pi-Hole Web Interface 2.8.1 - Persistent Cross-Site Scripting in Whitelist/Blacklist
by loneferret
CVE-2016-4312 EXPLOITDB HIGH text VERIFIED
WSO2 Identity Server <5.1.0 - SSRF
XML external entity (XXE) vulnerability in the XACML flow feature in WSO2 Identity Server 5.1.0 before WSO2-CARBON-PATCH-4.4.0-0231 allows remote authenticated users with access to XACML features to read arbitrary files, cause a denial of service, conduct server-side request forgery (SSRF) attacks, or have unspecified other impact via a crafted XACML request to entitlement/eval-policy-submit.jsp. NOTE: this issue can be combined with CVE-2016-4311 to exploit the vulnerability without credentials.
by hyp3rlinx
CVSS 7.5
CVE-2016-4316 EXPLOITDB MEDIUM text VERIFIED
WSO2 Carbon 4.4.5 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in WSO2 Carbon 4.4.5 allow remote attackers to inject arbitrary web script or HTML via the (1) setName parameter to identity-mgt/challenges-mgt.jsp; the (2) webappType or (3) httpPort parameter to webapp-list/webapp_info.jsp; the (4) dsName or (5) description parameter to ndatasource/newdatasource.jsp; the (6) phase parameter to viewflows/handlers.jsp; or the (7) url parameter to ndatasource/validateconnection-ajaxprocessor.jsp.
by hyp3rlinx
CVSS 6.1
CVE-2016-4314 EXPLOITDB MEDIUM text VERIFIED
WSO2 Carbon 4.4.5 - Path Traversal
Directory traversal vulnerability in the LogViewer Admin Service in WSO2 Carbon 4.4.5 allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the logFile parameter to downloadgz-ajaxprocessor.jsp.
by hyp3rlinx
CVSS 4.9
CVE-2016-4315 EXPLOITDB MEDIUM text VERIFIED
WSO2 Carbon 4.4.5 - CSRF
Cross-site request forgery (CSRF) vulnerability in WSO2 Carbon 4.4.5 allows remote attackers to hijack the authentication of privileged users for requests that shutdown a server via a shutdown action to server-admin/proxy_ajaxprocessor.jsp.
by hyp3rlinx
CVSS 5.7
CVE-2016-4340 EXPLOITDB HIGH text
Gitlab <8.7.0-8.2.4 - Auth Bypass
The impersonate feature in Gitlab 8.7.0, 8.6.0 through 8.6.7, 8.5.0 through 8.5.11, 8.4.0 through 8.4.9, 8.3.0 through 8.3.8, and 8.2.0 through 8.2.4 allows remote authenticated users to "log in" as any other user via unspecified vectors.
by Kaimi
CVSS 8.8
EIP-2026-114564 EXPLOITDB text
Zabbix 2.2.x/3.0.x - SQL Injection
by 1n3
CVE-2006-4844 EXPLOITDB text
Claroline <1.7.7 - RCE
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.
by GulfTech Security
CVE-2025-34110 EXPLOITDB CRITICAL text
ColoradoFTP Server < 1.3 Build 8 - Path Traversal
A directory traversal vulnerability exists in ColoradoFTP Server ≤ 1.3 Build 8 for Windows, allowing unauthenticated attackers to read or write arbitrary files outside the configured FTP root directory. The flaw is due to insufficient sanitation of user-supplied file paths in the FTP GET and PUT command handlers. Exploitation is possible by submitting traversal sequences during FTP operations, enabling access to system-sensitive files. This issue affects only the Windows version of ColoradoFTP.
by Rv3Laboratory
CVE-2006-4019 EXPLOITDB text
SquirrelMail <1.4.7 - Code Injection
Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users.
by GulfTech Security