Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 438 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

gMotor2 Game Engine Multiple Vulnerabilities

The gMotor2 game engine is prone to multiple code-execution and denial-of-service vulnerabilities. Four vulnerabilities were reported. These vulnerabilities may be triggered by malicious client requests to games that use the affected engine, including rFactor. Successful exploits could crash a game server or let remote attackers execute arbitrary code on the computer hosting affected software.

Remote Denial-of-Service Vulnerability in Cisco IOS

The vulnerability is caused by the software's failure to handle certain CLI commands. Attackers can trigger this vulnerability by successfully authenticating to vulnerable devices through remote anonymous means or by sending specially crafted input to web interfaces. Successful exploitation allows attackers to trigger device reboots, resulting in a denial of service for legitimate users.

Cross-Site Scripting Vulnerability in Text File Search Classic

Text File Search Classic is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Sun Java Runtime Environment Remote Privilege-Escalation Vulnerability

The Sun Java Runtime Environment is prone to a remote privilege-escalation vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the user who invoked the Java applet. Successfully exploiting this issue may result in the remote compromise of affected computers.

Systeme de vote pour site Web Remote File Include Vulnerabilities

The 'Systeme de vote pour site Web' application is prone to multiple remote file-include vulnerabilities due to insufficient sanitization of user-supplied input. Exploiting these issues may allow an attacker to compromise the application and the underlying system, and other attacks are also possible.

Recent Exploits: