Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 203 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Achievo v1.4.3 – Multiple Web Vulnerabilities

Multiple persistant cross site & a blind SQL vulnerabilities are detected on the resource management tool Achievo v1.4.3. The bug allows remote attacker to implement malicious script code on the application side and/or to execute sql commands via remote sql injection attack. Successful exploitation of the vulnerability allows an attacker to manipulate specific modules & can lead to session hijacking (user/mod/admin) and/or to compromise the application & dbms.

Icona SpA C6 Messenger DownloaderActiveX Control Arbitrary File Download and Execute

This module exploits a vulnerability in Icona SpA C6 Messenger 1.0.0.1. The vulnerability is in the DownloaderActiveX Control (DownloaderActiveX.ocx). The insecure control can be abused to download and execute arbitrary files in the context of the currently logged-on user.

Sysax Multi Server 5.50 Create Folder BOF

This exploit allows an attacker to create a folder with a specially crafted SID parameter in the Sysax Multi Server version 5.50. The vulnerability was discovered on January 13, 2012 and a fix was released on January 17, 2012 in version 5.52. The exploit has been tested on XP SP3 32bit and Server 2003 SP2 32bit without DEP.

W-Cms Multiple Vulnerability

W-CMS is vulnerable to cross-site scripting (XSS) attacks and directory traversal attacks. The XSS vulnerability can be exploited through the 'index.php' and '?p=' parameters, allowing an attacker to inject malicious scripts. The directory traversal vulnerability allows an attacker to access sensitive files on the server by manipulating the 'p' parameter.

Recent Exploits: