Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 385 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Q-News Remote File Include Vulnerability

Q-News is prone to a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary remote PHP code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.

iishack 2000

This is a proof of concept exploit that affects unpatched Windows 2000 machines with the .printer ISAPI filter loaded. It allows for EIP overruns at position 260, with 19 bytes of code to jump back to the beginning of the buffer. The exploit includes a 4 byte EIP jumping into a jmp esp located in mfc42.dll. The buffer itself has approximately 250 bytes before the overflow and 211 bytes after it. The overflow occurs in the Host: header of the .printer extension, with certain characters causing issues. The exploit can be compiled on Windows, Linux, and *BSD systems and uses a simple TCP vector.

Athena PHP Website Administration Remote File Include Vulnerability

The Athena PHP Website Administration application is prone to a remote file include vulnerability. This vulnerability occurs due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this vulnerability by injecting a malicious URL as the value of the 'athena_dir' parameter in the 'athena.php' script. This allows the attacker to execute arbitrary remote PHP code on the affected system with the privileges of the web server process, potentially leading to unauthorized access.

PBLang HTML Injection Vulnerabilities

PBLang is prone to multiple HTML injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.

AgileBill SQL Injection Vulnerability

AgileBill is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly santize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Multiple SQL Injection Vulnerabilities in Support Center

Support Center is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

eFiction SQL Injection, Remote File Upload, and XSS Vulnerabilities

eFiction is vulnerable to SQL injection, remote file upload, and cross site scripting vulnerabilities. These vulnerabilities allow an attacker to view and modify sensitive information, gain unauthorized access, modify and corrupt the underlying database application, and obtain a victim's authentication credentials. An example of the SQL injection exploit is the 'UNION SELECT' statement in the 'viewuser.php' page.

eFiction Multiple Vulnerabilities

eFiction is prone to SQL injection, remote file upload, and cross site scripting vulnerabilities. These vulnerabilities may allow an attacker to view and modify sensitive information, gain unauthorized access, modify and corrupt the underlying database application, and obtain a victim's authentication credentials.

eFiction SQL Injection, Remote File Upload, and Cross Site Scripting Vulnerabilities

The vulnerabilities in eFiction allow an attacker to view and modify sensitive information, gain unauthorized access, modify and corrupt the underlying database application, and obtain a victim's authentication credentials. An example exploit URL is provided.

eFiction Vulnerabilities

eFiction is prone to SQL injection, remote file upload, and cross site scripting vulnerabilities. These vulnerabilities may allow an attacker to view and modify sensitive information, gain unauthorized access, modify and corrupt the underlying database application, and obtain a victim's authentication credentials.

Recent Exploits: