Text Exploits

31,330 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-101688 EXPLOITDB text
Edimax BR6228nS/BR6228nC - Multiple Vulnerabilities
by smash
EIP-2026-111252 EXPLOITDB text
PhpWiki 1.5.4 - Multiple Vulnerabilities
by smash
EIP-2026-101693 EXPLOITDB text
Edimax PS-1206MF - Web Admin Authentication Bypass
by smash
CVE-2015-6811 EXPLOITDB text
Cyberoamos - SQL Injection
SQL injection vulnerability in the Sophos Cyberoam CR500iNG-XP firewall appliance with CyberoamOS 10.6.2 MR-1 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter to login.xml.
by Dharmendra Kumar Singh
EIP-2026-101970 EXPLOITDB text
Samsung SyncThruWeb 2.01.00.26 - SMB Hash Disclosure
by Shad Malloy
CVE-2015-6567 EXPLOITDB HIGH text
Wolfcms Wolf Cms < 0.8.3 - Improper Input Validation
Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly. Exploitation requires a registered user who has access to upload functionality.
by Narendra Bhati
CVSS 8.8
CVE-2015-10144 EXPLOITDB HIGH text VERIFIED
Responsive Thumbnail Slider <1.0.1 - Code Injection
The Responsive Thumbnail Slider plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type sanitization in the via the image uploader in versions up to 1.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected sites server using a double extension which may make remote code execution possible.
by Arash Khazaei
CVSS 8.8
CVE-2015-6568 EXPLOITDB HIGH text
Wolfcms Wolf Cms < 0.8.3 - Improper Input Validation
Wolf CMS before 0.8.3.1 allows unrestricted file rename and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not prevent a change of a file extension to ".php" after originally using the parameter "filename" for uploading a JPEG image. Exploitation requires a registered user who has access to upload functionality.
by Narendra Bhati
CVSS 8.8
EIP-2026-111358 EXPLOITDB text
Pluck CMS 4.7.3 - Multiple Vulnerabilities
by smash
EIP-2026-102384 EXPLOITDB text
Jenkins 1.626 - Cross-Site Request Forgery / Code Execution
by smash
EIP-2026-102179 EXPLOITDB text
Photo Transfer (2) 1.0 iOS - Denial of Service
by Vulnerability-Lab
EIP-2026-116597 EXPLOITDB text
Xion Audio Player 1.5 build 155 - Stack Buffer Overflow
by Un_N0n
CVE-2015-6810 EXPLOITDB text
Invisionpower Invision Power Board - XSS
Cross-site scripting (XSS) vulnerability in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) 4.x before 4.0.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the event_location[address] array parameter to calendar/submit/.
by snop
CVE-2017-1000028 EXPLOITDB HIGH text VERIFIED
Oracle GlassFish Server Open Source Edition 4.1 - Path Traversal
Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request.
by Trustwave's SpiderLabs
CVSS 7.5
CVE-2015-3214 EXPLOITDB text VERIFIED
Linux kernel <2.6.33 & QEMU <2.3.1 - Use After Free
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
by Google Security Research
CVE-2015-0065 EXPLOITDB text VERIFIED
Microsoft Word - Resource Management Error
Microsoft Word 2007 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "OneTableDocumentStream Remote Code Execution Vulnerability."
by Google Security Research
CVE-2015-0064 EXPLOITDB text VERIFIED
Microsoft Web Applications - Resource Management Error
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Automation Services in SharePoint Server 2010, Web Applications 2010 SP2, Word Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Office Remote Code Execution Vulnerability."
by Google Security Research
CVE-2016-6195 EXPLOITDB CRITICAL text VERIFIED
vBulletin <4.2.2 PL5 & <4.2.3 PL1 - SQL Injection
SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016.
by Manish Tanwar
CVSS 9.8
EIP-2026-101818 EXPLOITDB text
Keeper IP Camera 3.2.2.10 - Authentication Bypass
by RAT - ThiefKing
EIP-2026-115338 EXPLOITDB text
GOM Audio 2.0.8 - '.gas' Crash (PoC)
by Un_N0n
EIP-2026-114330 EXPLOITDB text
WordPress Theme GeoPlaces3 - Arbitrary File Upload
by Mdn_Newbie
CVE-2015-4481 EXPLOITDB text VERIFIED
Mozilla Firefox < 39.0.3 - Race Condition
Race condition in the Mozilla Maintenance Service in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file during an update.
by Google Security Research
CVE-2015-2456 EXPLOITDB text VERIFIED
Microsoft Lync < 5.1.40416.0 - Improper Input Validation
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2455.
by Google Security Research
CVE-2015-2463 EXPLOITDB text VERIFIED
Microsoft .net Framework < 5.1.40416.0 - Improper Input Validation
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2464.
by Google Security Research
CVE-2015-2464 EXPLOITDB text VERIFIED
Microsoft .net Framework < 5.1.40416.0 - Improper Input Validation
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2463.
by Google Security Research