Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 245 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution

This modules exploits a vulnerability found in the Oracle WebCenter Content CheckOutAndOpenControl ActiveX. This vulnerability exists in openWebdav(), where user controlled input is used to call ShellExecuteExW(). This module abuses the control to execute an arbitrary HTA from a remote location. This module has been tested successfully with the CheckOutAndOpenControl ActiveX installed with Oracle WebCenter Content 11.1.1.6.0.

Directory Traversal in SlimServe HTTP server

SlimServe HTTP server is vulnerable to directory traversal attacks, which allow malicious users to read files outside of the web server root directory. An attacker can exploit this vulnerability by sending a crafted HTTP request containing '../' sequences to access sensitive files on the server.

Denial of Service in Raven Software Soldier Of Fortune 2

A remote denial of service vulnerability affects Raven Software Soldier Of Fortune 2. The problem presents itself specifically when the affected server application receives an excessively large value through a '/ignore' command from a malicious client. An attacker may leverage this issue to cause an affected server to crash, denying service to legitimate users.

Phoroum SQL Injection Vulnerability

Phoroum is prone to SQL injection attacks. Insufficient sanitization of user input may allow a malicious user to manipulate the structure and logic of database queries. Successful exploitation could allow the attacker to compromise security properties of the application and the database. Possible consequences include unauthorized access to the application and database.

BOINC Manager 7.0.64 Field stack based buffer overflow

BOINC Manager 7.0.64 is vulnerable to a field stack based buffer overflow. An attacker can exploit this vulnerability by convincing the victim to use a very long URL as the Account Manager URL. This can be done by generating the URL using the provided exploit. The severity of this vulnerability is low.

Multiple input validation vulnerabilities in Forum Russian Board

The Forum Russian Board is prone to multiple input validation vulnerabilities. These issues can allow attackers to carry out SQL Injection, cross-site scripting, and HTML injection attacks.

Clam AntiVirus ClamAV CHM Chunk Name Length DoS Vulnerability

This is a vulnerability in ClamAV that allows an attacker to cause a denial of service by sending a specially crafted CHM file. The vulnerability is due to a flaw in the handling of CHM chunk names, which can be exploited to crash the application. The vulnerability was discovered by Damian Put and all credits go to him.

Recent Exploits: