Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 387 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-Site Scripting in blogBuddies

The blogBuddies application is prone to multiple cross-site scripting vulnerabilities. These vulnerabilities are caused by a failure in the application to properly sanitize user-supplied input. An attacker can exploit these vulnerabilities to execute arbitrary script code in the browser of a victim user in the context of the affected site. This can lead to the theft of cookie-based authentication credentials and other attacks.

Multiple Cross-Site Scripting Vulnerabilities in blogBuddies

blogBuddies is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Ezyhelpdesk Multiple SQL Injection Vulnerabilities

Ezyhelpdesk is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

CommodityRentals SQL Injection Vulnerability

The CommodityRentals application is vulnerable to SQL injection. An attacker can exploit this vulnerability by injecting malicious SQL code into the 'user_id' parameter in the 'moviedetails.php' page. Successful exploitation could lead to compromise of the application, disclosure or modification of data, or exploitation of vulnerabilities in the underlying database implementation.

PHP Labs Survey Wizard SQL Injection Vulnerability

The PHP Labs Survey Wizard is vulnerable to an SQL injection attack. This vulnerability occurs due to the application's failure to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by injecting malicious SQL code into the 'sid' parameter of the 'survey.php' URL. Successful exploitation of this vulnerability could lead to various consequences, including compromise of the application, disclosure or modification of data, and the ability to exploit other vulnerabilities in the database implementation.

OmnistarLive Multiple SQL Injection Vulnerabilities

OmnistarLive is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Tunez Multiple Input Validation Vulnerabilities

Tunez is prone to multiple input validation vulnerabilities. The application is affected by an SQL injection vulnerability and a cross-site scripting issue. Successful exploitation of the SQL injection issue could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. The cross-site scripting issue may facilitate the theft of cookie-based authentication credentials as well as other attacks.

1-2-3 Music Store SQL Injection Vulnerability

The 1-2-3 Music Store is vulnerable to an SQL injection attack. This vulnerability occurs due to the application's failure to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by manipulating the 'AlbumID' parameter in the 'process.php' file. Successful exploitation of this vulnerability could lead to a compromise of the application, disclosure or modification of data, or enable the attacker to exploit vulnerabilities in the underlying database implementation.

Cross-Site Scripting vulnerability in PmWiki

PmWiki is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: