Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 540 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BrowseDialog Class (ccrpbds6.dll) multiple methods Denial of Service

The BrowseDialog class in ccrpbds6.dll is vulnerable to a Denial of Service attack. The vulnerability is caused by two methods in the DLL that are unable to handle long strings, leading to a stack overflow. This vulnerability can be triggered by selecting the 'IsFolderAvailable' or 'RootFolder' options in the dropdown menu and clicking the 'Click here to start the test' button.

AOLServer Command Injection Vulnerability

AOLServer is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in logfiles. Attackers can exploit this issue to execute arbitrary commands in a terminal. The following example is available: echo -en "GET /x1b]2;owned?x07x0ax0dx0ax0d" > payload nc www.example.com 80 < payload

Core FTP Server Version 1.2, build 535, 32-bit – Crash P.O.C.

This script exploits a vulnerability in Core FTP Server version 1.2, build 535, 32-bit, causing it to crash. It takes the host, port, username, and password as command line arguments. The script then attempts to connect to the remote Core FTP Server and authenticate. After sending a first buffer of bad data, it waits for 30 seconds and sends a second buffer of bad data. This causes the server to crash, resulting in a denial of service.

Recent Exploits: