Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 580 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection Vulnerability in Joomla! Controller Component

The Controller component for Joomla! is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Juicy Gallery Joomla! Component SQL Injection Vulnerability

The Juicy Gallery component for Joomla! is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Joomla! ‘Foto’ Component SQL Injection Vulnerability

The 'Foto' component for Joomla! is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Easy Estate Rental SQL Injection Vulnerability

The Easy Estate Rental application is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. This can allow an attacker to manipulate the SQL queries and potentially compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

McAfee Data Loss Prevention Endpoint Arbitrary Write Privilege Escalation

This exploit allows an attacker to escalate their privileges and write arbitrary data in McAfee Data Loss Prevention Endpoint. The vulnerability exists in the hdlpctrl.sys driver of the software. By exploiting this vulnerability, an attacker can gain elevated privileges and potentially execute arbitrary code on the target system.

Linux Kernel DCCP_SOCKOPT_SEND_CSCOV Local Privilege Escalation

The exploit allows local attackers to escalate privileges on a system running the Linux kernel by exploiting a vulnerability in the DCCP_SOCKOPT_SEND_CSCOV option in the Datagram Congestion Control Protocol (DCCP) implementation. By sending a specially crafted request, an attacker can overwrite kernel memory, leading to privilege escalation.

Chyrp Multiple Vulnerabilities

Chyrp is prone to multiple cross-site scripting vulnerabilities, a local file-include vulnerability, an arbitrary file-upload vulnerability, and a directory-traversal vulnerability. An attacker may leverage these issues to execute arbitrary script code on an affected computer and in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, open or run arbitrary files in the context of the webserver process, and gain access to sensitive information.

Multiple vulnerabilities in Chyrp

Chyrp is prone to multiple cross-site scripting vulnerabilities, a local file-include vulnerability, an arbitrary file-upload vulnerability, and a directory-traversal vulnerability. An attacker may leverage these issues to execute arbitrary script code on an affected computer and in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, open or run arbitrary files in the context of the webserver process, and gain access to sensitive information.

Recent Exploits: