Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 13 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

minaliC 2.0.0 – Denial of Service (DoS)

The exploit targets minaliC 2.0.0 on Windows XP Professional Service Pack 2 and 3 (English). By sending a large amount of data via the GET method to the web server, the server crashes upon receiving and processing the request, leading to denial of service. Successful exploitation of this vulnerability allows remote attackers to disrupt the server, affecting legitimate users.

Honeywell PM43 Command Injection Remote Code Execution (RCE)

The exploit allows an attacker to remotely execute arbitrary code on Honeywell PM43 printers with firmware versions prior to P10.19.050004. By sending a crafted payload to the 'loadfile.lp?pageid=Configure' endpoint, an attacker can inject malicious commands. This vulnerability is identified as CVE-2023-3710.

FoF Pretty Mail 1.1.2 – Local File Inclusion Vulnerability

FoF Pretty Mail 1.1.2 extension for Flarum is vulnerable to Local File Inclusion (LFI) as it mishandles file paths in email templates. An attacker with administrative privileges can exploit this flaw to include sensitive server files in email content, potentially leading to information disclosure.

KiTTY 0.76.1.13 – Command Injection

A command injection vulnerability exists in KiTTY version 0.76.1.13 and below. By exploiting this vulnerability, a remote attacker could execute arbitrary commands on the target system. This vulnerability has been assigned CVE-2024-23749.

Arbitrary File Upload in WordPress Theme Travelscape v1.0.3

The vulnerability allows an attacker to upload arbitrary files to the server using the Wordpress Theme Travelscape v1.0.3. This could lead to remote code execution and compromise the website. This vulnerability has been assigned CVE-ID: CVE-2024-XXXX.

vm2 Sandbox Escape Vulnerability

The vm2 library version <= 3.9.19 is vulnerable to a sandbox escape exploit. By executing specially crafted code, an attacker can escape the sandbox environment and execute arbitrary commands on the host system. This vulnerability has been assigned CVE-2023-37466.

MinIO < 2024-01-31T20-20-33Z - Privilege Escalation

The MinIO software before the version RELEASE.2024-01-31T20-20-33Z allows privilege escalation. An attacker can exploit this vulnerability to gain unauthorized access to higher levels of privilege.

Daily Habit Tracker 1.0 – Stored Cross-Site Scripting (XSS)

Stored Cross-Site Scripting (XSS) allows attackers to inject malicious scripts into a web application's database, which are then executed when accessed by other users. This vulnerability affects parameters in 'Add Tracker' and 'Update Tracker' requests due to lack of input sanitization.

Recent Exploits: