Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 328 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Watermark Master v2.2.23 .wstyle Buffer Overflow (SEH)

This exploit targets a buffer overflow vulnerability in Watermark Master v2.2.23. By creating a malicious .wstyle file and placing it in the Video Styles folder, an attacker can cause the application to crash and potentially execute arbitrary code. The exploit takes advantage of a buffer overflow in the xmlstart variable, allowing the attacker to overwrite the next structured exception handler (nseh) and the subsequent structured exception handler (seh). The specific addresses used for the nseh and seh overwrite are provided in the code snippet. The exploit has been tested on Windows XP SP3.

TagIt! TagBoard Multiple Remote File Include Vulnerabilities

TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

TagIt! TagBoard Multiple Remote File Inclusion Vulnerabilities

TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

TagIt! TagBoard Remote File Include Vulnerability

TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

TagIt! TagBoard Remote File Include Vulnerabilities

TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Cross-Site Scripting Vulnerability in Atlassian JIRA

The Atlassian JIRA application is prone to a cross-site scripting vulnerability due to inadequate input sanitization. An attacker can exploit this vulnerability by injecting arbitrary script code into the affected site. This can lead to the execution of malicious scripts in the browser of unsuspecting users, potentially allowing the attacker to steal authentication credentials and launch further attacks.

Arbitrary File Upload Vulnerability in eXtreme File Hosting

The eXtreme File Hosting application fails to sufficiently sanitize user-supplied input, allowing an attacker to upload and execute arbitrary PHP script code in the context of the affected webserver process. This can lead to the compromise of the application and enable other possible attacks.

Sage Extension Feed HTML-injection vulnerability

The Sage Extension Feed application fails to properly sanitize user-supplied input before using it in dynamically generated content, leading to an HTML-injection vulnerability. Hostile HTML and script code can be injected into vulnerable sections of the application, which can be rendered in the browser of a user viewing a malicious RSS feed.

Recent Exploits: