Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 447 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Asp cvmatik HTML Injection Vulnerabilities

Asp cvmatik is prone to multiple HTML-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

Alisveris Sitesi Scripti Cross-Site Scripting Vulnerability

The Alisveris Sitesi Scripti application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, potentially stealing authentication credentials and launching further attacks.

Alisveris Sitesi Scripti SQL Injection Vulnerabilities

Alisveris Sitesi Scripti is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Dora Emlak Script Multiple Input-Validation Vulnerabilities

The Dora Emlak Script is prone to multiple input-validation vulnerabilities, including HTML-injection and SQL-injection issues. These vulnerabilities occur because the application fails to properly sanitize user-supplied input. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, execute arbitrary script code in the context of the webserver process, steal cookie-based authentication credentials, compromise the application, obtain sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database.

Multiple Cross-Site Scripting Vulnerabilities in UseBB

The UseBB application fails to properly sanitize user-supplied input, leading to multiple cross-site scripting vulnerabilities. An attacker can exploit these vulnerabilities to execute arbitrary script code in the browser of an unsuspecting user, potentially allowing them to steal cookie-based authentication credentials and launch further attacks.

geoBlog Multiple Security-Bypass Vulnerabilities

The geoBlog application fails to properly validate users when deleting user blogs and comments, leading to multiple security-bypass vulnerabilities. An attacker can exploit these vulnerabilities to delete blogs and comments regardless of the security settings, potentially aiding them in further attacks.

Multiple Security-Bypass Vulnerabilities in geoBlog

geoBlog is prone to multiple security-bypass vulnerabilities because the application fails to properly validate users when deleting user blogs and comments. An attacker may exploit these issues to delete blogs and comments regardless of the security settings. This may aid the attacker in further attacks.

Recent Exploits: