Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 452 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Yoggie Pico and Pico Pro Remote Code-Execution Vulnerability

The Yoggie Pico and Pico Pro devices are vulnerable to a remote code-execution vulnerability due to insufficient input sanitization. An attacker can exploit this vulnerability to execute arbitrary code with superuser privileges, leading to a complete compromise of the affected devices. The attacker can replace the original /etc/shadow file to set the root password of their choosing and gain complete control over the device by running dropbear sshd on a specific port.

Cross-Site Scripting vulnerabilities in Claroline

Claroline is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Cross-Site Scripting Vulnerability in Oracle Rapid Install Web Server

The Oracle Rapid Install Web Server is vulnerable to a cross-site scripting (XSS) attack due to inadequate input sanitization. An attacker can exploit this vulnerability by injecting malicious HTML and script code into the victim's browser. This can lead to the theft of authentication credentials and enable further attacks.

PC SOFT WinDEV Stack-based Buffer Overflow Vulnerability

PC SOFT WinDEV is prone to a stack-based buffer-overflow vulnerability when it attempts to process malformed project files. This issue occurs because the application fails to perform proper bounds-checking on user-supplied data before copying it to an insufficiently sized memory buffer. An attacker may exploit this issue to execute arbitrary code with the privileges of the user running the vulnerable application or to cause denial-of-service conditions. This may facilitate unauthorized access or privilege escalation.

Cross-Site Scripting Vulnerabilities in Linksys Wireless-G ADSL Gateway

The Linksys Wireless-G ADSL Gateway is prone to multiple cross-site scripting vulnerabilities due to inadequate input sanitization. Attackers can exploit this by enticing victims to open a malicious URI. This can lead to the execution of arbitrary script code in the user's browser within the context of the affected device. The attacker can then steal authentication credentials, cause denial-of-service conditions, and launch further attacks. Successful exploits allow persistent storage of script code in the affected device.

eTicket Multiple Cross-Site Scripting Vulnerabilities

eTicket is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

GD Graphics Library Multiple Vulnerabilities

The GD graphics library is prone to multiple vulnerabilities. An attacker can exploit this issue to cause denial-of-service conditions or execute arbitrary code in the context of applications implementing the affected library.

Multiple SQL Injection Vulnerabilities in Calendarix

The Calendarix application is prone to multiple SQL-injection vulnerabilities. These vulnerabilities occur because the application fails to sufficiently sanitize user-supplied data before using it in SQL queries. An attacker can exploit these vulnerabilities to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: