Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 431 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-site scripting and information-disclosure vulnerabilities in WebBatch

WebBatch is prone to a cross-site scripting vulnerability and an information-disclosure vulnerability because it fails to adequately sanitize user-supplied input. An attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. The attacker may leverage the information-disclosure issue to obtain potentially sensitive information that could aid in further attacks.

WebBatch Cross-Site Scripting and Information Disclosure Vulnerabilities

WebBatch is prone to a cross-site scripting vulnerability and an information-disclosure vulnerability because it fails to adequately sanitize user-supplied input. An attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. The attacker may leverage the information-disclosure issue to obtain potentially sensitive information that could aid in further attacks.

Cross-Site Scripting Vulnerabilities in LevelOne WBR3404TX Broadband Router

The LevelOne WBR3404TX Broadband Router is prone to multiple cross-site scripting vulnerabilities because the software fails to sufficiently sanitize user-supplied input. These issues occur in the web management panel. Exploiting these vulnerabilities may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected site. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.

Cross-Site Scripting Vulnerability in b1gMail

The b1gMail application is prone to a cross-site scripting vulnerability due to insufficient input sanitization. This vulnerability can be exploited by an attacker to execute arbitrary script code in the context of the affected website, potentially leading to the theft of authentication credentials and other malicious actions.

Coppermine Photo Gallery Cross-Site Scripting and Local File Inclusion Vulnerabilities

The Coppermine Photo Gallery is vulnerable to a cross-site scripting issue and a local file-include issue. Attackers can exploit these vulnerabilities to steal cookie-based authentication credentials, execute arbitrary code, and retrieve arbitrary content within the context of the webserver process.

Coppermine Photo Gallery Cross-Site Scripting and Local File Include Vulnerabilities

The Coppermine Photo Gallery is prone to a cross-site scripting issue and a local file-include issue. Attackers can exploit these issues to steal cookie-based authentication credentials, execute arbitrary code, and retrieve arbitrary content within the context of the webserver process.

Buffer Overflow Vulnerability in CFileFind::FindFile Method

The CFileFind::FindFile method in the MFC library for Microsoft Windows is prone to a buffer-overflow vulnerability because the method fails to perform adequate boundary checks of user-supplied input. Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of applications that use the vulnerable method.

Multiple Integer-Overflow Vulnerabilities in Python’s imageop Module

Python's imageop module is prone to multiple integer-overflow vulnerabilities because it fails to properly bounds-check user-supplied input to ensure that integer operations do not overflow. To successfully exploit these issues, an attacker must be able to control the arguments to imageop functions. Remote attackers may be able to do this, depending on the nature of applications that use the vulnerable functions. Attackers would likely submit invalid or specially crafted images to applications that perform imageop operations on the data. A successful exploit may allow attacker-supplied machine code to run in the context of affected applications, facilitating the remote compromise of computers.

Recent Exploits: