Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 217 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HP Data Protector Cliet EXEC_SETUP Remote Code Execution Vulnerability PoC (ZDI-11-056)

The following PoC instructs an HP Data Protector Client to download and install an .exe file. It tries to get the file from a share (pwn2003se.home.it) and if it fails it tries to access the same file via HTTP. To get the PoC working with this payload share a malicious file via HTTP under http://pwn2003se.home.it/Omniback/i386/installservice.exe.exe and you are done. Tweak payload to better suit your needs.

Steam Cloud Denial of Service 0day

The exploit involves copying a file to a specific location in the Steam directory and then running Steam.exe, causing the program to crash. This results in the synchronization of the user's configuration file with their account. When the user logs in on another computer with the same account, Steam crashes.

Adobe Audition 3.0 (build 7283) Session File Handling Buffer Overflow PoC

Adobe Audition suffers from a buffer overflow vulnerability when dealing with .SES (session) format file. The application fails to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the attacker to gain the power of executing arbitrary code or denial of service.

SPlayer <= 3.7 (build 2055) Buffer Overflow Exploit

SPlayer is vulnerable to a remote buffer overflow when parsing a specially crafted HTTP header from a remote server. The bug is triggered due to the "Content-Type:" field being passed to the wcstol() function, prior to any bounds checking. This could allow an attacker to trick a remote user into opening a specially crafted playlist file, containing a URL pointing to a malicious web server.

Recent Exploits: