Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 436 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Buffer Overflow Vulnerability in Media Player Classic

Media Player Classic is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data. Attackers may attempt to exploit this issue by coercing users to access malicious FLI files. Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the user running the affected application. This facilitates the remote compromise of affected computers.

Vavoom Multiple Remote Vulnerabilities

An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.For the buffer-overflow vulnerability, the attacker opens the 'vavoombasevdoom2config.cfg' file, and adds the following lines:'alias bof "say aaa...(992_'a's)...aaa" name ''aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'' '

Multiple Remote Vulnerabilities in Vavoom

Vavoom is prone to multiple remote vulnerabilities, including a buffer-overflow issue, a format-string issue, and a denial-of-service issue. An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.

Multiple Remote Denial-of-Service Vulnerabilities in Soldat

Soldat is prone to multiple remote denial-of-service vulnerabilities because of how the game software handles unexpected input. Successfully exploiting these issues allows remote attackers to crash game servers and clients or to block arbitrary IP addresses from connecting to game servers.

Skulltag Remote Heap-based Buffer Overflow Vulnerability

Skulltag is prone to a remote heap-based buffer-overflow vulnerability because it fails to perform adequate boundary-checks on user-supplied input. Attackers can exploit this issue to execute arbitrary code with the privileges of the user running the application. Successful exploits may compromise affected computers. Failed attacks will likely cause denial-of-service conditions.

Cross-site scripting vulnerability in WordPress Pool

The WordPress Pool application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the context of the affected site, potentially stealing authentication credentials and launching further attacks.

Microsoft Windows NtRaiseHardError Csrss.exe-winsrv.dll Double Free

This exploit targets the NtRaiseHardError function in Microsoft Windows. It takes advantage of a double free vulnerability in the Csrss.exe-winsrv.dll module. By exploiting this vulnerability, an attacker can potentially execute arbitrary code on the target system.

Asura Engine Remote Stack-based Buffer Overflow Vulnerability

Asura Engine is prone to a remote stack-based buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Recent Exploits: