Text Exploits

31,341 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-106860 EXPLOITDB text
Employee Performance Evaluation System v1.0 - File Inclusion and RCE
by nu11secur1ty
CVE-2021-46360 EXPLOITDB HIGH text VERIFIED
Composr-CMS <10.0.39 - Authenticated RCE
Authenticated remote code execution (RCE) in Composr-CMS 10.0.39 and earlier allows remote attackers to execute arbitrary code via uploading a PHP shell through /adminzone/index.php?page=admin-commandr.
by Sarang Tumne
CVSS 8.8
CVE-2022-35155 EXPLOITDB MEDIUM text VERIFIED
Phpgurukul Bus Pass Management System - XSS
Bus Pass Management System v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the searchdata parameter.
by Ali Alipour
CVSS 6.1
CVE-2022-26521 EXPLOITDB HIGH text VERIFIED
Abantecart <1.3.2 - RCE
Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an administrator (e.g., by configuring .php to be a valid image file type).
by Sarang Tumne
CVSS 7.2
EIP-2026-101240 EXPLOITDB text
D-Link DNR-322L <=2.60B15 - Authenticated Remote Code Execution
by luka
CVE-2022-40946 EXPLOITDB HIGH text
D-Link DIR-819 <1.06 - DoS
On D-Link DIR-819 Firmware Version 1.06 Hardware Version A1 devices, it is possible to trigger a Denial of Service via the sys_token parameter in a cgi-bin/webproc?getpage=html/index.html request.
by whokilleddb
CVSS 7.5
CVE-2022-36664 EXPLOITDB MEDIUM text
Adiscon Password Manager For Iis - XSS
Password Manager for IIS 2.0 has a cross-site scripting (XSS) vulnerability via the /isapi/PasswordManager.dll ResultURL parameter.
by VP4TR10T
CVSS 6.1
CVE-2022-50891 EXPLOITDB MEDIUM text
Owlfiles File Manager 12.0.1 - XSS
Owlfiles File Manager 12.0.1 contains a cross-site scripting vulnerability that allows attackers to inject malicious scripts through the path parameter in HTTP server endpoints. Attackers can craft URLs targeting the download and list endpoints with embedded script tags to execute arbitrary JavaScript in users' browsers.
by Chokri Hammedi
CVSS 5.0
CVE-2022-50890 EXPLOITDB HIGH text
Owlfiles File Manager 12.0.1 - Path Traversal
Owlfiles File Manager 12.0.1 contains a path traversal vulnerability in its built-in HTTP server that allows attackers to access system directories. Attackers can exploit the vulnerability by crafting GET requests with directory traversal sequences to access restricted system directories on the device.
by Chokri Hammedi
CVSS 7.5
CVE-2023-54340 EXPLOITDB HIGH text
WorkOrder CMS 0.1.0 - SQL Injection
WorkOrder CMS 0.1.0 contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login by manipulating username and password parameters. Attackers can inject malicious SQL queries using techniques like OR '1'='1' and stacked queries to access database information or execute administrative commands.
by Chokri Hammedi
CVSS 8.2
CVE-2022-38840 EXPLOITDB HIGH text
Güralp MAN-EAM-0003 3.2.4 - XXE
cgi-bin/xmlstatus.cgi in Güralp MAN-EAM-0003 3.2.4 is vulnerable to an XML External Entity (XXE) issue via XML file upload, which leads to local file disclosure.
by Ahmed Alroky
CVSS 7.5
CVE-2022-36804 EXPLOITDB HIGH text
Atlassian Bitbucket Server/Data Center <7.6.17/<7.17.10/<7.21.4/<8....
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.
by khal4n1
CVSS 8.8
CVE-2022-35583 EXPLOITDB CRITICAL text
Wkhtmltopdf - SSRF
wkhtmlTOpdf 0.12.6 is vulnerable to SSRF which allows an attacker to get initial access into the target's system by injecting iframe tag with initial asset IP address on it's source. This allows the attacker to takeover the whole infrastructure by accessing their internal assets.
by Momen Eldawakhly
CVSS 9.8
CVE-2022-50894 EXPLOITDB MEDIUM text
VIAVIWEB Wallpaper Admin 1.0 - SQL Injection
VIAVIWEB Wallpaper Admin 1.0 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the img_id parameter. Attackers can send GET requests to edit_gallery_image.php with malicious img_id values to extract database information.
by Edd13Mora
CVSS 6.5
CVE-2022-50893 EXPLOITDB CRITICAL text
VIAVIWEB Wallpaper Admin 1.0 - RCE
VIAVIWEB Wallpaper Admin 1.0 contains an unauthenticated remote code execution vulnerability in the image upload functionality. Attackers can upload a malicious PHP file through the add_gallery_image.php endpoint to execute arbitrary code on the server.
by Edd13Mora
CVSS 9.8
CVE-2022-50892 EXPLOITDB HIGH text
VIAVIWEB Wallpaper Admin 1.0 - SQL Injection
VIAVIWEB Wallpaper Admin 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating login credentials. Attackers can exploit the login page by injecting 'admin' or 1=1-- - payload to gain unauthorized access to the administrative interface.
by Edd13Mora
CVSS 8.2
CVE-2022-38841 EXPLOITDB HIGH text
Linksys AX3200 1.1.00 - Command Injection
Linksys AX3200 1.1.00 is vulnerable to OS command injection by authenticated users via shell metacharacters to the diagnostics traceroute page.
by Ahmed Alroky
CVSS 8.8
EIP-2026-101085 EXPLOITDB text
SoX 14.4.2 - Denial Of Service
by LiquidWorm
CVE-2022-37197 EXPLOITDB HIGH text
IOBit IOTransfer V4 - Unquoted Service Path
IOBit IOTransfer V4 is vulnerable to Unquoted Service Path.
by BLAY ABU SAFIAN
CVSS 7.8
CVE-2022-31188 EXPLOITDB HIGH text
CVAT <2.0.0 - SSRF
CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability. Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade. There are no known workarounds for this issue.
by Emir Polat
CVSS 8.6
CVE-2022-23854 EXPLOITDB HIGH text
AVEVA InTouch Access Anywhere <2020 R2 - Path Traversal
AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.
by Jens Regel
CVSS 7.5
CVE-2022-2441 EXPLOITDB HIGH text
Orangelab Imagemagick Engine < 1.7.5 - CSRF
The ImageMagick Engine plugin for WordPress is vulnerable to remote code execution via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to run arbitrary commands leading to remote command execution, granted they can trick a site administrator into performing an action such as clicking on a link. This makes it possible for an attacker to create and or modify files hosted on the server which can easily grant attackers backdoor access to the affected server.
by ABDO10
CVSS 8.8
CVE-2022-2840 EXPLOITDB CRITICAL text VERIFIED
Zephyr Project Manager <3.2.5 - SQL Injection
The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections
by Rizacan Tufan
CVSS 9.8
CVE-2022-50896 EXPLOITDB MEDIUM text
Testa 3.5.1 - XSS
Testa 3.5.1 contains a reflected cross-site scripting vulnerability in the login.php redirect parameter that allows attackers to inject malicious scripts. Attackers can craft a specially encoded payload in the redirect parameter to execute arbitrary JavaScript in victim's browser context.
by Ashkan Moghaddas
CVSS 6.1
CVE-2022-50895 EXPLOITDB CRITICAL text
Aero CMS 0.0.1 - SQL Injection
Aero CMS 0.0.1 contains a SQL injection vulnerability in the author parameter that allows attackers to manipulate database queries. Attackers can exploit boolean-based, error-based, time-based, and UNION query techniques to extract sensitive database information and potentially compromise the system.
by nu11secur1ty
CVSS 9.8