Text Exploits

31,330 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-113056 EXPLOITDB text
Vesta Control Panel 0.9.8-15 - Persistent Cross-Site Scripting
by Necmettin COSKUN
EIP-2026-106458 EXPLOITDB text
DirectAdmin 1.491 - Cross-Site Request Forgery
by Necmettin COSKUN
CVE-2006-0806 EXPLOITDB text
John LIM Adodb - XSS
Multiple cross-site scripting (XSS) vulnerabilities in ADOdb 4.71, as used in multiple packages such as phpESP, allow remote attackers to inject arbitrary web script or HTML via (1) the next_page parameter in adodb-pager.inc.php and (2) other unspecified vectors related to PHP_SELF.
by GulfTech Security
EIP-2026-111725 EXPLOITDB text
Redaxo 5.0.0 - Multiple Vulnerabilities
by LSE Leading Security Experts GmbH
EIP-2026-110013 EXPLOITDB text VERIFIED
OCS Inventory NG 2.2 - SQL Injection
by Ephreet
CVE-2015-2080 EXPLOITDB HIGH text
Fedora < 9.2.9.v20150224 - Information Disclosure
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
by LiquidWorm
CVSS 7.5
CVE-2016-0985 EXPLOITDB HIGH text VERIFIED
Adobe Flash Player <18.0.0.329-20.0.0.306 - RCE
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
by Google Security Research
CVSS 8.8
CVE-2016-0984 EXPLOITDB HIGH text VERIFIED
Adobe Flash Player <18.0.0.329, 19.x, 20.x - Use After Free
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.
by Google Security Research
CVSS 8.8
CVE-2016-0965 EXPLOITDB HIGH text VERIFIED
Adobe Flash Player <18.0.0.329, 19.x, 20.x - Memory Corruption
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
by Google Security Research
CVSS 8.8
CVE-2016-0974 EXPLOITDB HIGH text VERIFIED
Adobe Flash Player <18.0.0.329, 19.x, 20.x - Use After Free
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
by Google Security Research
CVSS 8.8
EIP-2026-103390 EXPLOITDB text VERIFIED
Adobe Flash - H264 Parsing Out-of-Bounds Read
by Google Security Research
CVE-2016-0967 EXPLOITDB HIGH text VERIFIED
Adobe Flash Player <18.0.0.329,19.x,20.x - Memory Corruption
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
by Google Security Research
CVSS 8.8
CVE-2016-0964 EXPLOITDB HIGH text VERIFIED
Adobe Flash Player <18.0.0.329, 19.x, 20.x - Memory Corruption
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
by Google Security Research
CVSS 8.8
CVE-2016-0971 EXPLOITDB HIGH text VERIFIED
Adobe Flash Player <18.0.0.329,19.x,20.x - Buffer Overflow
Heap-based buffer overflow in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors.
by Google Security Research
CVSS 8.8
CVE-2018-4878 EXPLOITDB HIGH text
Adobe Flash Player < 28.0.0.161 - Use After Free
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
by smgorelik
CVSS 7.8
EIP-2026-115114 EXPLOITDB text
CyberCop Scanner Smbgrind 5.5 - Buffer Overflow (PoC)
by hyp3rlinx
EIP-2026-113560 EXPLOITDB text
WordPress Plugin ALO EasyMail NewsLetter 2.6.01 - Cross-Site Request Forgery
by Mohsen Lotfi
EIP-2026-111144 EXPLOITDB text
phpMyBackupPro 2.5 - Remote Command Execution / Cross-Site Request Forgery
by hyp3rlinx
EIP-2026-104326 EXPLOITDB text
ManageEngine OPutils 8.0 - Multiple Vulnerabilities
by Kaustubh G. Padwad
EIP-2026-104324 EXPLOITDB text
ManageEngine Network Configuration Management Build 11000 - Privilege Escalation
by Kaustubh G. Padwad
CVE-2015-7547 EXPLOITDB HIGH text VERIFIED
GNU C Library <2.23 - Buffer Overflow
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
by Google Security Research
CVSS 8.1
CVE-2016-0049 EXPLOITDB MEDIUM text VERIFIED
Microsoft Windows 10 - Credentials Management
Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."
by Nabeel Ahmed
CVSS 6.2
EIP-2026-114893 EXPLOITDB text
Alternate Pic View 2.150 - '.pgm' Crash (PoC)
by Shantanu Khandelwal
EIP-2026-112700 EXPLOITDB text
Tiny Tiny RSS - Blind SQL Injection
by Kacper Szurek
CVE-2018-4878 EXPLOITDB HIGH text
Adobe Flash Player < 28.0.0.161 - Use After Free
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
by smgorelik
CVSS 7.8