Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 154 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft IIS User Enumeration Vulnerability

Microsoft IIS is prone to an issue where the existence of users may be revealed to remote attackers. The vulnerability exists when users attempt to authenticate against a vulnerable system. IIS will generate an error page if authentication fails. Different messages are generated depending on whether the user exists or not.

Invision Power Board <= 3.3.4 unserialize() PHP Code Execution

This exploit allows for PHP code execution in Invision Power Board versions up to 3.3.4. It bypasses the patch that sanitizes the unserialize function by using a specific payload. This vulnerability can be exploited by an attacker to execute arbitrary code on the target system.

Improper Bounds Checking in regedit.exe

A local attacker can execute arbitrary code as another user by exploiting improper bounds checking in the regedit.exe program. By trapping a key in the registry and having a non-informed user browse it with regedit.exe, the attacker can execute an arbitrary command without the user's knowledge. The vulnerability is caused by a misused RegEnumValueW function in regedit.exe.

EMC Networker Format String

This module exploits a format string vulnerability in the lg_sprintf function as implemented in liblocal.dll on EMC Networker products. This module exploits the vulnerability by using a specially crafted RPC call to the program number 0x5F3DD, version 0x02, and procedure 0x06. This module has been tested successfully on EMC Networker 7.6 SP3 on Windows XP SP3 and Windows 2003 SP2 (DEP bypass).

BadBlue Remote Unauthorized Access Vulnerability

The vulnerability is caused by an input validation issue in the 'ext.dll' component of BadBlue. A remote attacker can exploit this vulnerability by sending a specially crafted request to the server. By causing '.hts' files to be interpreted by the server, the attacker can execute administrative commands without authorization.

Vulnerability in Vignette StoryServer

Under certain circumstances, Vignette StoryServer may reveal stack memory content. A specially crafted request for a page that accepts user-supplied data can trigger an error state, which will result in a dump of the current stack contents being returned to the attacker's browser within an error message. This information can be used to mount further attacks against the system.

Recent Exploits: