Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 582 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ClearSCADA Remote Authentication Bypass Exploit

There is an authentication bypass vulnerability in ClearSCADA that can be exploited by triggering an exception in dbserver.exe and taking advantage of the way the program handles it. When an exception occurs, ClearSCADA enters "Safe Mode" which exposes its diagnostic functions to remote users without requiring a valid login. A remote attacker could view sensitive information and possibly modify functions of the server running on the affected host.

Paliz Portal Multiple Vulnerabilities

The Paliz Portal application is prone to multiple SQL-injection vulnerabilities and a cross-site scripting vulnerability. These vulnerabilities occur due to a failure in properly sanitizing user-supplied input. An attacker can exploit these issues to steal cookie-based authentication credentials, control the rendering of the site, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Local File Include Vulnerability in com_jr_tfb component for Joomla!

The 'com_jr_tfb' component for Joomla! is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.

iMesh <= 10.0 (IMWebControl.dll) Remote Buffer Overflow Exploit

The iMesh application is prone to a buffer overflow vulnerability due to inadequate boundary checks on user-supplied data. Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code in the context of the application using an affected ActiveX control, typically in Internet Explorer. Failed exploit attempts may result in denial-of-service conditions.

Web Content System <<< v2.7.1 Remote File Include Exploit

This exploit allows remote attackers to include and execute arbitrary files on a vulnerable web server. The vulnerability exists due to the application not properly sanitizing user-supplied input in the 'path[JavascriptEdit]' parameter. An attacker can exploit this vulnerability to include a remote file containing malicious PHP code and execute it on the target system.

Stack-based Buffer-Overflow Vulnerability in NetBSD

The NetBSD operating system is prone to a stack-based buffer-overflow vulnerability affecting multiple functions in the 'libc/net' library. Successful exploits may allow an attacker to execute arbitrary code in the context of the application using the affected library. Failed exploit attempts will result in a denial-of-service condition.

jclassifiedsmanager Multiple Vulnerabilities

The jclassifiedsmanager component is vulnerable to SQL Injection and XSS attacks. The 'id' parameter in the 'displayads' task is not sanitized, allowing an attacker to inject malicious SQL code. The 'view' parameter in the 'displayads' task is also not sanitized, allowing an attacker to inject arbitrary JavaScript code.

Recent Exploits: