Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 460 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Prototype of an PHP application – Multiple Remote File Include Vulnerabilities

The 'Prototype of an PHP application' is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input to the application. An attacker may leverage these issues to execute an arbitrary remote file containing malicious script code in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system. Other attacks are also possible.

Prototype of an PHP application – Multiple Remote File-Include Vulnerabilities

The 'Prototype of an PHP application' is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input to the application. An attacker may leverage these issues to execute an arbitrary remote file containing malicious script code in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system. Other attacks are also possible.

Prototype of an PHP application remote file-include vulnerabilities

The 'Prototype of an PHP application' is vulnerable to multiple remote file-include vulnerabilities due to improper input sanitization. An attacker can exploit these vulnerabilities by injecting malicious script code into a remote file, which can lead to the compromise of the application and the underlying system.

Prototype of an PHP application Remote File Include Vulnerabilities

The 'Prototype of an PHP application' is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input to the application. An attacker may leverage these issues to execute an arbitrary remote file containing malicious script code in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system. Other attacks are also possible.

PHP JackKnife Input Validation Vulnerabilities

The PHP JackKnife application is prone to multiple input-validation vulnerabilities, including cross-site scripting (XSS) and SQL-injection issues. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

PHP JackKnife Multiple Input-Validation Vulnerabilities

PHP JackKnife is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Heap-based Buffer Overflow and Denial-of-Service in Bochs

Bochs is prone to a heap-based buffer-overflow issue and a denial-of-service issue. The buffer-overflow issue occurs because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. The denial-of-service vulnerability is caused by a divide-by-zero operation. A local attacker can exploit these issues to execute arbitrary code in the context of the affected application or to cause denial-of-service conditions. Failed exploit attempts of the buffer-overflow vulnerability will also result in denial-of-service conditions.

Cross-site scripting vulnerability in Particle Gallery

The Particle Gallery application is prone to a cross-site scripting vulnerability due to inadequate sanitization of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other malicious activities.

Ovidentia 7.9.6 Multiple Vulnerabilities

SQL injection vulnerability: Log into admin panel and access delegate functionality > managing administrators where &id parameter (shown below link) is vulnerable to sql injection. CSRF vulnerability: log into the admin portal and access the create user functionality using csrf vulnerability it was possible to add new user.

Recent Exploits: