header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Windows Animated Cursor Handling Exploit (0day)

This exploit allows for remote code execution on fully patched Windows Vista systems. It has been tested on Windows Vista Enterprise Version 6.0 (Build 6000) and Windows Vista Ultimate Version 6.0 (Build 6000) with default installation and UAC enabled. It may also work on other nt based Windows systems, but this has not been tested.

Featurific For WordPress Plugin Cross-Site Scripting Vulnerability

Featurific For WordPress plugin for WordPress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Cross-Site Scripting vulnerability in ClickDesk Live Support plugin for WordPress

The ClickDesk Live Support plugin for WordPress is vulnerable to a cross-site scripting (XSS) attack. This vulnerability occurs due to a lack of proper input sanitization, allowing an attacker to inject and execute arbitrary script code in the browser of a victim user. By exploiting this vulnerability, an attacker can potentially steal authentication credentials and launch further attacks.

Multiple vulnerabilities in Dolibarr

Dolibarr is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Dolibarr Multiple Cross-Site Scripting and SQL Injection Vulnerabilities

Dolibarr is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Multiple Cross-Site Scripting and SQL-Injection Vulnerabilities in Dolibarr

Dolibarr is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

TA.CMS local file-include and SQL-injection vulnerabilities

The TA.CMS application is vulnerable to multiple local file-include and SQL-injection vulnerabilities. An attacker can exploit these issues to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and view and execute arbitrary local files within the context of the webserver.

TA.CMS Local File Inclusion and SQL Injection Vulnerabilities

The TA.CMS application is vulnerable to multiple local file inclusion and SQL injection vulnerabilities. An attacker can exploit these vulnerabilities to compromise the application, gain unauthorized access to or modify data, exploit other vulnerabilities in the database, and view and execute arbitrary local files within the context of the webserver.

Cross-Site Scripting Vulnerability in Adminimize Plugin for WordPress

The Adminimize plugin for WordPress is prone to a cross-site scripting vulnerability. This vulnerability occurs due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, within the context of the affected site. This can lead to the theft of cookie-based authentication credentials and the execution of other attacks.

Recent Exploits: