header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

mcGallery PRO multiple input validation vulnerabilities

The application fails to properly sanitize user-supplied input, leading to multiple vulnerabilities. These vulnerabilities can result in compromise of the application, arbitrary local file inclusion and code execution, disclosure or modification of data, and theft of cookie-based authentication credentials. Additionally, these vulnerabilities may also allow the attacker to exploit vulnerabilities in the underlying database implementation and perform other attacks.

Multiple Input Validation Vulnerabilities in mcGallery PRO

mcGallery PRO is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could result in a compromise of the application, arbitrary local file inclusion and code execution, disclosure or modification of data, and the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

Input Validation Vulnerabilities in mcGallery PRO

mcGallery PRO is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.Successful exploitation of these vulnerabilities could result in a compromise of the application, arbitrary local file inclusion and code execution, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

Multiple Input-Validation Vulnerabilities in Snipe Gallery

Snipe Gallery is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, and exploit vulnerabilities in the underlying database implementation. Other attacks are possible as well.

Input-validation vulnerabilities in Snipe Gallery

Snipe Gallery is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, and exploit vulnerabilities in the underlying database implementation. Other attacks are possible as well.

Snipe Gallery Multiple Input-Validation Vulnerabilities

The Snipe Gallery application fails to properly sanitize user-supplied input, leading to multiple input-validation vulnerabilities. An attacker can exploit these vulnerabilities to compromise the application, access or modify data, steal cookie-based authentication credentials, and exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

Mantis Cross-Site Scripting Vulnerability

Mantis is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: