Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 488 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

V-EVA Classified Script SQL Injection Vulnerability

The V-EVA Classified Script is vulnerable to SQL injection attacks due to insufficient sanitization of user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to compromise the application, access or modify data, or exploit other vulnerabilities in the database.

Clix’N’Cash Clone 2010 SQL Injection Vulnerability

Clix'N'Cash Clone 2010 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

eBay Clone Script 2010 SQL Injection Vulnerability

eBay Clone Script 2010 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

MySpace Clone 2010 SQL Injection and Cross-Site Scripting Vulnerabilities

The MySpace Clone 2010 application is prone to an SQL-injection and a cross-site scripting vulnerability due to insufficient sanitization of user-supplied data. Exploiting these vulnerabilities could lead to various consequences such as stealing cookie-based authentication credentials, compromising the application, accessing or modifying data, or exploiting latent vulnerabilities in the underlying database.

PHP Bible Search SQL Injection and XSS Vulnerabilities

PHP Bible Search is vulnerable to an SQL injection vulnerability and a cross-site scripting vulnerability. These vulnerabilities exist because the application fails to properly sanitize user-supplied data. An attacker can exploit these vulnerabilities to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

PHP Bible Search SQL Injection and Cross-Site Scripting Vulnerabilities

PHP Bible Search is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Multiple SQL-Injection and Cross-Site Scripting Vulnerabilities in OneCMS

The OneCMS application is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. Exploiting these vulnerabilities could allow an attacker to steal authentication credentials, control the site's rendering, compromise the application, access or modify data, or exploit other latent vulnerabilities in the database.

Macromedia SwDir.dll ver. 10.1.4.20 multiple methods Stack Overflow

This exploit targets the Macromedia SwDir.dll version 10.1.4.20. It utilizes multiple methods to trigger a stack overflow vulnerability. By manipulating certain values in the object and select elements, an attacker can cause a stack overflow and potentially execute arbitrary code.

BlaherTech Placeto CMS SQL Injection Vulnerability

BlaherTech Placeto CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: