Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 108 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sandbox 2.0.3 Multiple Remote Vulnerabilities

Some parameters are not sanitised before being used in SQL queries and in danger PHP's functions. The vulnerabilities are reported in version 2.0.3. Other versions may also be affected. The vulnerabilities include Authentication Bypass, Arbitrary File Upload, Local File Inclusion, and SQL Injection.

minerCPP 0.4b Remote BOF+Format String Attack Exploit

This exploit takes advantage of a format string attack vulnerability in the minerCPP 0.4b software. It allows an attacker to calculate the master cookie and get the ESP of the current thread. However, due to the BOF being in another thread, the ESP obtained may not match the required ESP, making the exploit unstable. Code execution worked 10 out of 50 times.

UFO: Alien Invasion v2.2.1 BoF Exploit (Win7 ASLR and DEP Bypass)

This exploit allows for a buffer overflow in the UFO: Alien Invasion game version 2.2.1 on Windows 7. By redirecting the victim's DNS to a specific IP and having them click on the multiplayer lobby, an attacker can execute arbitrary code. The exploit has been tested on Windows 7 Ultimate x64 ENG. There is a possibility that this exploit can work on a different Windows version by changing the last bytes of the exploit code.

Recent Exploits: