Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 559 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MS14-012 Internet Explorer TextRange Use-After-Free

This module exploits a use-after-free vulnerability found in Internet Explorer. The flaw was most likely introduced back in 2013, therefore only certain builds of MSHTML are affected. In our testing with IE9, these vulnerable builds appear to be between 9.0.8112.16496 and 9.0.8112.16533, which implies August 2013 until early March 2014 (before the patch).

Remote stack-based buffer overflow vulnerability in DATAC RealWin SCADA server

DATAC RealWin SCADA server is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.An attacker can exploit this issue to execute arbitrary code in the context of the affected application. This may facilitate the complete compromise of affected computers. Failed exploit attempts may result in a denial-of-service condition.

Omegaboard v1.0b4 (phpbb_root_path) Remote File Include Exploit

This exploit allows an attacker to include arbitrary remote files in the target system using the 'phpbb_root_path' parameter in the 'functions.php' file of Omegaboard v1.0b4. By manipulating the 'phpbb_root_path' parameter, an attacker can execute malicious code or gain unauthorized access to the target system.

Omnicom Content Platform Directory Traversal Vulnerability

Omnicom Content Platform is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. To exploit this issue an attacker may need administrative privileges to the affected application. Exploiting the issue may allow the attacker to obtain sensitive information that could aid in further attacks.

Folder Gallery Remote Code Execution

The vulnerability allows remote attackers to execute arbitrary code on the target system by injecting a malicious shell command through the 'galleryfilesdir' parameter in the template.php file of JV2 Folder Gallery. This can be exploited to gain unauthorized access to the system or perform other malicious activities.

Ping of Death

The Ping of Death is a type of attack where an attacker sends an oversized ping packet to a target system. This oversized packet can cause the target system to crash or become unresponsive, leading to a denial of service condition. The specific command mentioned in the text is an example of how the Ping of Death can be executed.

Recent Exploits: