Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 405 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ProWizard 4 PC Multiple Buffer Overflow

ProWizard 4 PC is prone to multiple stack-based buffer-overflow issues because it fails to perform adequate boundary checks on user-supplied data. Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts likely result in denial-of-service conditions.

Adobe Flash Player Cross-Site Scripting Vulnerability

The Adobe Flash Player application fails to properly sanitize user-supplied input, allowing an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can lead to the theft of cookie-based authentication credentials and enable other attacks.

Linux Kernel IPv6 ‘Hop-By-Hop’ Headers Remote Denial of Service Vulnerability

The Linux kernel is prone to a remote denial-of-service vulnerability because it fails to adequately validate specially crafted IPv6 'Hop-By-Hop' headers. Attackers can exploit this issue to cause a kernel panic, denying service to legitimate users.

phpMyAdmin-2.5.7 Exploit

This exploit program takes advantage of a vulnerability in phpMyAdmin-2.5.7. It acts as a mysql server proxy and replaces the real table name with a string containing exploite codes when the client queries 'SHOW TABLES'. The aim is to inject PHP code into phpMyAdmin and execute a command to touch a file on the server. The exploit code is built by combining the database name, php code, and a captured example code from the mysql server's response.

Cross-Site Scripting Vulnerabilities in Mambo

Mambo is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Remote Buffer Overflow in Common UNIX Printing System (CUPS)

The Common UNIX Printing System (CUPS) is prone to a remote buffer-overflow vulnerability due to the software's failure to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer. Exploiting this issue allows attackers to execute arbitrary machine code in the context of users running the affected software. Failed exploit attempts will likely result in denial-of-service conditions.

iMesh Code-Execution Vulnerability

iMesh is prone to a code-execution vulnerability because the application fails to sanitize user-supplied data, which can lead to memory corruption. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using an affected ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

Recent Exploits: