Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 204 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Hashtable Denial of Service Vulnerability

This script generates payloads to exploit hash collision vulnerabilities in various servers including Apache Geronimo, Oracle Glassfish, PHP, and Apache Tomcat. It can be used to make multiple requests to a server without waiting for a response, potentially causing a denial of service. The payload length, collision character length, and number of collision characters can be customized.

Splunk Remote Root Exploit

This is a remote root exploit for Splunk. It allows an attacker to gain root access to a Splunk server. The exploit takes advantage of a vulnerability in the Splunk admin interface and the Splunkd Web API. By exploiting this vulnerability, an attacker can execute arbitrary code on the target system.

Recent Exploits: