Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 363 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Info-ZIP ‘unzip’ Filename Buffer Overflow Vulnerability

This vulnerability in Info-ZIP 'unzip' allows attackers to execute arbitrary machine code in the context of users running the affected application. The issue arises due to the application's failure to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.

Multiple input validation vulnerabilities in Mercury CMS

The vulnerabilities in Mercury CMS are due to a failure in properly sanitizing user-supplied input. Successful exploitation could lead to compromise of the application, disclosure or modification of data, theft of authentication credentials, and other attacks. The vulnerabilities include SQL injection and cross-site scripting (XSS) vulnerabilities.

Komodo CMS Multiple Input Validation Vulnerabilities

Komodo CMS is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

E-Publish Multiple Input Validation Vulnerabilities

E-Publish is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

Multiple Input Validation Vulnerabilities in Community Enterprise

These vulnerabilities are a result of improper input sanitization in Community Enterprise. Successful exploitation could lead to application compromise, data disclosure or modification, theft of authentication credentials, and exploitation of underlying database vulnerabilities.

Multiple Input Validation Vulnerabilities in bitweaver

bitweaver is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

Input validation vulnerabilities in Baseline CMS

Baseline CMS is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input. A successful exploit could allow an attacker to compromise the application, access or modify data, exploit vulnerabilities in the underlying database, steal cookie-based authentication credentials, and launch other attacks.

Miraserver SQL Injection Vulnerabilities

Miraserver is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Recent Exploits: