Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 435 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Input-validation vulnerabilities in Cisco Unified CallManager and Unified Communications Manager

Multiple input-validation vulnerabilities in Cisco Unified CallManager and Unified Communications Manager allow attackers to steal authentication credentials, execute malicious script code, compromise the application, access or modify data, or exploit underlying database vulnerabilities.

Buffer Overflow Vulnerability in Microsoft MSN Messenger

Microsoft MSN Messenger is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in denial-of-service conditions.

Calendar Events SQL Injection Vulnerability

The Calendar Events application is vulnerable to an SQL injection attack. By supplying malicious input in the 'id' parameter of the 'viewevent.php' page, an attacker can manipulate the SQL query to execute arbitrary SQL code. This can lead to unauthorized access, data manipulation, or exploitation of other vulnerabilities in the database.

Motorola Timbuktu Pro Directory Traversal Vulnerability

Motorola Timbuktu Pro is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. Exploiting this issue may allow an attacker to delete or create arbitrary files with SYSTEM-level privileges. This could completely compromise affected computers.

Cross-site Scripting Vulnerability in AutoIndex PHP Script

The AutoIndex PHP Script is vulnerable to a cross-site scripting (XSS) attack due to insufficient sanitization of user-supplied input data. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, within the context of the affected site. This can lead to the theft of cookie-based authentication credentials and the launch of further attacks.

Thomson SpeedTouch 2030 Denial-of-Service Vulnerability

The Thomson SpeedTouch 2030 device is prone to a denial-of-service vulnerability. This vulnerability is caused by the device's failure to handle specially crafted SIP INVITE messages. By exploiting this issue, remote attackers can cause the device to stop responding, denying service to legitimate users.

Recent Exploits: