Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 568 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Script:bbclone

The vulnerability exists in the bbclone script, specifically in the lib/selectlang.php file. The vulnerability is caused by the insecure handling of the BBC_LANGUAGE_PATH parameter. An attacker can exploit this vulnerability by injecting malicious code into the BBC_LANGUAGE_PATH parameter, leading to arbitrary code execution. This vulnerability was discovered by Dr Max Virus in 2007.

IBM Lotus Sametime Remote Buffer Overflow Vulnerability

The vulnerability exists in IBM Lotus Sametime due to a failure to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this vulnerability to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in a denial of service.

Sami HTTP Server HTTP 404 – Object not found Denial of Service

The server is unable to handle more than 2002 requests to non-existent files, pages, folders, etc. When the number of requests exceeds 2002, it stops answering, stops writing to the log file, and the admin will be unable to kick or ban users. The only thing you can do is to kill the process.

Oracle10g R1 and R2 Privilege Escalation Exploit

This exploit targets Oracle10g R1 and R2 versions prior to CPU Oct 2006. It allows an attacker to escalate their privileges by creating a session and a procedure. The exploit uses a function called F1, which is granted DBA privileges to the user 'TEST'. The exploit then executes the function and commits the changes. Finally, it retrieves user role privileges using the user_role_privs table. The exploit was developed by Joxean Koret.

Exploit for Oracle10g R1 and R2 prior to CPU Oct 2006

This exploit allows an attacker with CREATE SESSION privileges to insert malicious code into the sys.sysauth$ table in Oracle10g R1 and R2 prior to CPU Oct 2006. This can lead to unauthorized access and potential compromise of the system.

Recent Exploits: