header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

JW Player for Flash & HTML5 Video Cross-Site Request-Forgery Vulnerability

JW Player for Flash & HTML5 Video is a Plugin for WordPress is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.

Infocus Theme for WordPress Local File Disclosure Vulnerability

The Infocus theme for WordPress is prone to a local file-disclosure vulnerability because it fails to adequately validate user-supplied input. Exploiting this vulnerability would allow an attacker to obtain potentially sensitive information from local files on computers running the vulnerable application. This may aid in further attacks.

Seo Panel Directory Traversal Vulnerability

Seo Panel is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Remote attackers can use a specially crafted request with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application. Information obtained could aid in further attacks.

Huawei E303 Router Cross-Site Request-Forgery Vulnerability

Huawei E303 Router is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks. Proof-of-concept HTTP POST request is provided in the text.

webEdition CMS SQL Injection Vulnerability

webEdition CMS is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input. A successful exploit will allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Castor Library Information Disclosure Vulnerability

An attacker can exploit this issue to gain access to sensitive information that may lead to further attacks. This is done by taking in external XML data from a user controllable location and passing it through an unmarshalling function, which can be used to view local resources on the application’s hosting server.

User Cake Cross-Site Request Forgery Vulnerability

User Cake is prone to a cross-site request-forgery vulnerability because it does not properly validate HTTP requests. An attacker can exploit this issue to perform unauthorized actions in the context of a logged-in user of the affected application. This may aid in other attacks.

Search Everything plugin for WordPress SQL-injection Vulnerability

Search Everything plugin for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: