Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 107 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mini-Stream RM-MP3 Converter v3.1.2.1 (.pls) Stack Buffer Overflow

This exploit is a stack buffer overflow in Mini-Stream RM-MP3 Converter v3.1.2.1 when parsing a specially crafted .pls file. The vulnerability allows an attacker to execute arbitrary code by overwriting the return address on the stack and redirecting the program flow to the attacker's shellcode.

Campsite CMS remote Persistent XSS vulnerability

The vulnerability allows an attacker to inject malicious scripts into the website by exploiting the Campsite CMS. The attacker can achieve this by logging in as an admin and going to the administration section, specifically the articles editing option. In the heading or content section, the attacker can insert the following script: <marquee><h1>XSS3d By D4rk357</h1><marquee>. Another method for exploiting this vulnerability is for a user to upload a persistent XSS while submitting an article on the website using the same method.

Corel WordPerfect Office X5 15.0.0.357 (wpd) Remote Buffer Preoccupation PoC

Corel WordPerfect Office X5 is prone to a remote buffer overflow vulnerability because the application fails to perform adequate boundary checks on user supplied input with .WPD (WordPerfect Document) file. Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

b2evolution 3.3.3 Cross site request forgery

The b2evolution 3.3.3 application is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can create a malicious HTML page that will make a request to the targeted b2evolution admin panel, tricking the authenticated user into performing unintended actions on their behalf.

Recent Exploits: