Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 332 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

212Cafe Guestbook Cross-Site Scripting Vulnerability

The 212Cafe Guestbook application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability by injecting arbitrary script code into the affected site, which can then be executed in the browser of an unsuspecting user. This allows the attacker to potentially steal authentication credentials and launch further attacks.

Cross-site scripting vulnerabilities in Bitweaver

Bitweaver is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

SQL Injection Vulnerability in Unique Ads

The Unique Ads application is vulnerable to SQL injection due to improper sanitization of user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Sami HTTP Server Denial-of-Service Vulnerability

The vulnerability allows remote attackers to crash the Sami HTTP Server application, denying further service to legitimate users. By sending a large number of requests to non-existent files, pages, or folders, the server becomes unresponsive and stops writing to log files. The admin will be unable to manage or ban users, and the only solution is to kill the process.

Heap Overflow vulnerability in Transmit 3

Transmit 3 is prone to a heap-overflow vulnerability because it fails to perform sufficient boundary checks on user-supplied data before copying it to a buffer. An attacker could leverage this issue to have arbitrary code execute with administrative privileges. A successful exploit could result in the complete compromise of the affected system.

DeepBurner <= 1.8.0 dbr parsing remote buffer overflow

This exploit allows an attacker to trigger a buffer overflow in the 'file name' tag of the dbr file, resulting in an access violation and the ability to overwrite the SEH handler. The stack can be corrupted, but a jmpover can be used to avoid this. The exploit uses a specific RETcode type: POP REG, POP REG, RET. It is recommended to search for your own RETcodes to improve reliability.

MS04011 Lsasrv.dll RPC buffer overflow remote exploit

This exploit targets a buffer overflow vulnerability in the Lsasrv.dll RPC service. It allows remote attackers to execute arbitrary code on the vulnerable system. The exploit requires the target IP, victim IP, and bindport to be specified. Optionally, a connectback IP can also be provided. The exploit supports multiple targets including Windows XP Professional and Windows 2000 Professional. It also has an option to detect the remote operating system. The exploit has been tested on various versions of Windows XP Professional and Windows 2000 Professional.

HTML-injection vulnerability in SMF

SMF is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. NOTE: To trigger this vulnerability, the attacker must log in with a valid account.

Recent Exploits: