Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 313 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Directory Traversal Vulnerability in HP Web JetAdmin

HP Web JetAdmin is prone to a directory traversal vulnerability that allows remote attackers to access information outside the server root directory. This vulnerability occurs due to insufficient sanitization of user-supplied data passed via the 'setinclude' parameter of the 'setinfo.hts' script. Attackers can exploit this vulnerability to upload malicious files and gain unauthorized access to a vulnerable server.

Nexgen FTP Server Remote Directory Traversal Vulnerability

The Nexgen FTP server is prone to a remote directory traversal vulnerability. This vulnerability allows authenticated users to bypass file request string sanitization and gain access to sensitive information on the server. An attacker can exploit this vulnerability to launch further attacks on the system.

FirstClass HTTP Server Cross-Site Scripting Vulnerability

The FirstClass HTTP Server is prone to a cross-site scripting vulnerability that may allow a remote attacker to execute arbitrary HTML or script code in a user's browser. The vulnerability is caused by insufficient sanitization of user-supplied data via the 'TargetName' parameter of the 'Upload.shtml' script. An attacker can exploit this issue by injecting malicious code into the 'TargetName' parameter, which will be executed in the context of the user's browser when the vulnerable script is accessed.

Local Buffer Overflow in ‘man’ command

The 'man' command is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. Exploiting this issue allows attackers to execute malicious machine code with the privileges of the 'man' utility. This can result in the compromise of affected computers. Failed exploit attempts will likely result in denial-of-service conditions.

Cross-Site Scripting Vulnerability in Livor

Livor is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Denial-of-Service Vulnerabilities in IrfanView

IrfanView is prone to multiple denial-of-service vulnerabilities because the application fails to properly handle malformed BMP image files. Successfully exploiting these issues allows attackers to crash the affected application. Due to the nature of the issues, code execution may also be possible, but this has not been confirmed.

ACDSee 9.0 Photo Manager Multiple Denial-of-Service Vulnerabilities

ACDSee 9.0 Photo Manager is prone to multiple denial-of-service vulnerabilities because the application fails to properly handle malformed BMP image files. Successfully exploiting these issues allows attackers to crash the affected application. Due to the nature of the issues, code execution may also be possible, but this has not been confirmed.

SQL Injection vulnerability in Gazi Okul Sitesi

The Gazi Okul Sitesi web application is prone to an SQL-injection vulnerability due to insufficient sanitization of user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Denial-of-Service Vulnerabilities in FastStone Image Viewer

FastStone Image Viewer is prone to multiple denial-of-service vulnerabilities because the application fails to properly handle malformed BMP image files. Successfully exploiting these issues allows attackers to crash the affected application. Given the nature of these issues, attackers may also be able to run arbitrary code, but this has not been confirmed.

Recent Exploits: