Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 600 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Local Privilege Escalation in OProfile

The OProfile tool is vulnerable to a local privilege escalation vulnerability. An attacker can exploit this vulnerability to execute arbitrary commands with superuser privileges. By using a specially crafted command, an attacker can run arbitrary commands with elevated privileges.

ClanSphere Local File Inclusion and Arbitrary File Upload Vulnerabilities

ClanSphere is prone to a local file-include vulnerability and multiple arbitrary-file-upload vulnerabilities. An attacker can exploit these issues to upload arbitrary files onto the webserver, execute arbitrary local files within the context of the webserver, and obtain sensitive information.

Cross-Site Scripting in phpGraphy

phpGraphy is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Multiple Cross-Site Scripting Vulnerabilities in BackupPC

BackupPC is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Cross-Site Scripting Vulnerabilities in Kusaba X

Kusaba X is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Cross-Site Scripting in WP Photo Album plugin for WordPress

The WP Photo Album plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Cross-Site Scripting in Daily Maui Photo Widget plugin for WordPress

The Daily Maui Photo Widget plugin for WordPress is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Cisco Unified Communications Manager SQL Injection Vulnerabilities

The Cisco Unified Communications Manager is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an authenticated attacker to compromise the affected device, access or modify data, or exploit latent vulnerabilities in the underlying database.

Mambo 4.5.1 Modules Flatmenu <= 1.07 Remote File Include Exploit

This exploit targets the Mambo 4.5.1 Modules Flatmenu version 1.07 and allows remote file inclusion. The vulnerability is found in the mod_flatmenu.php file, which can be accessed through the mosConfig_absolute_path parameter. An attacker can include remote files by manipulating this parameter.

Recent Exploits: