Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 153 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BananaDance Wiki b2.2 – Multiple Web Vulnerabilities

A SQL Injection vulnerability is detected in the BananaDance Wiki B2.2 Content Management System. The vulnerability allows an attacker (remote) or local privileged moderator/admin user account to execute own SQL commands on the affected application dbms. Multiple persistent input validation vulnerabilities are also detected in the BananaDance Wiki B2.2 CMS. The bugs allow remote attackers to implement/i...

MS06-040 Remote Code Execution Proof of Concept

This is a proof-of-concept code for the MS06-040 vulnerability, which allows remote code execution. It is tested against Windows XP SP1 and Windows 2000 SP4. The affected systems include Microsoft Windows 2000 SP0-SP4, Microsoft Windows XP SP0-SP1, and Microsoft Windows NT 4.0.

Memory Exposure in Vignette

Vignette is prone to an issue which may expose the contents of memory to remote attackers. This condition is due to a flaw in how StoryServer calculates the size of certain characters in URI variables, which may cause data from adjacent memory to be returned to the remote attacker in the response.

Format String Vulnerability in Magic Winmail Server

A format string vulnerability has been reported for Magic Winmail Server when processing the USER POP3 command. An attacker may exploit this vulnerability by connecting to the vulnerable mail server and issuing the USER command with malicious format string specifiers. This may result in the corruption of sensitive memory.

Weak Password Encryption Algorithm in MySQL

MySQL has been reported to implement a weak password encryption algorithm. It has been reported that the MySQL function used to encrypt MySQL passwords makes just one pass over the password and employs a weak left shift based cipher. The hash may be cracked in little time using a bruteforce method. An attacker may use information recovered in this way to aid in further attacks launched against the underlying system.

Recent Exploits: