Text Exploits
31,337 exploits tracked across all sources.
WordPress Theme Wp-ImageZoom - 'id' SQL Injection
by Amirh03in
WordPress Plugin Ads Box - 'count' SQL Injection
by Ashiyane Digital Security Team
PRADO PHP Framework 3.2.0 - Arbitrary File Read
by LiquidWorm
Forescout CounterACT <7.0 - Open Redirect
Open redirect vulnerability in assets/login on the Forescout CounterACT NAC device before 7.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the a parameter.
by Joseph Sheridan
WordPress Theme Magazine Basic - 'id' SQL Injection
by Novin hack
WordPress Plugin Zingiri Web Shop - 'path' Arbitrary File Upload
by Ashiyane Digital Security Team
WordPress Plugin Zarzadzonie Kontem - 'ajaxfilemanager.php' Script Arbitrary File Upload
by Ashiyane Digital Security Team
WordPress Plugin Webplayer - 'id' SQL Injection
by Novin hack
ManageEngine ServiceDesk 8.0 - Multiple Vulnerabilities
by Vulnerability-Lab
Adobe Reader 10.1.4 - JP2KLib&CoolType Crash (PoC)
by coolkaveh
PHP Server Monitor - Persistent Cross-Site Scripting
by loneferret
dotProject <2.1.7 - SQL Injection
Multiple SQL injection vulnerabilities in dotProject before 2.1.7 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) search_string or (2) where parameter in a contacts action, (3) dept_id parameter in a departments action, (4) project_id[] parameter in a project action, or (5) company_id parameter in a system action to index.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
by High-Tech Bridge
dotProject <2.1.7 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to index.php. NOTE: the date parameter vector is already covered by CVE-2008-3886.
by High-Tech Bridge
By Source