wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121The Finger Server is a perl script for providing .plan-like functionality through a website. Due to insufficient input checking, it is possible for remote unauthenticated users to execute shell commands on the server which will run with the privileges of the webserver. A request like: http://target/finger.cgi?action=archives&cmd=specific&filename=99.10.28.15.23.username.|<shell command>| will cause the server to execute whatever command is specified.
This module exploits a stack buffer overflow in Oracle 8i. When sending a specially crafted packet containing an overly long ARGUMENTS string to the TNS service, an attacker may be able to execute arbitrary code.
Avaya Argent Office is prone to a denial of service condition when handling malformed DNS packets. The problem occurs when a DNS packet with no payload is handled, causing the device to reboot.
The Inso DynaWeb webserver dwhttpd is prone to a remotely exploitable format-string vulnerability that occurs when logging requests for files that do not exist. Exploits may allow attacker-supplied code supplied to run with the privileges of the dwhttpd. Note that a vulnerability described in Bugtraq ID 5583 allows for unauthenticated remote attackers to view the logfile. Attackers may exploit that vulnerability to more easily exploit this issue successfully and automatically.
Under certain conditions, an application launched by a regular user on an OpenBSD system can cause a system crash. This occurs when the application attempts to pipe a NULL value, triggering a kernel fault and crashing the system. A malicious local user can exploit this vulnerability to deny service to legitimate users of the system.
The pmake program, specifically the Makefile executed by pmake, allows the user to set certain user-defined variables. One such variable is the .SHELL variable, where a format string can be supplied in the check= field. By exploiting this vulnerability, an attacker can write to an arbitrary memory address of the program, potentially overwriting the return address and executing arbitrary code with root privileges.
ActivePerl contains a remotely exploitable buffer overflow vulnerability in handling of the URL string. It is due to an unbounded string copy operation. This vulnerability allows remote attackers to gain access to the target server.
Rwhoisd is a publicly available RWHOIS server daemon for Unix based systems developed and maintained by Network Solutions Inc. It contains a remotely exploitable format string vulnerability. Attackers can execute arbitrary code on affected hosts by supplying malicious format specifiers as the argument to the '-soa' directive.
A buffer overflow condition can be triggered in Oracle 9iAS Web Cache 2.0.0.1.0 by submitting a malicious URL. This overflow can lead to either the process exiting, the process hanging, or the injection of malicious code. This occurs on all four services provided by Web Cache.
The msgchk utility in certain versions of Digital Unix is vulnerable to a buffer overflow. This vulnerability can be exploited by a local user by invoking the msgchk utility with a long string of bytes, triggering a buffer overflow condition. If msgchk is running with suid root privileges, this can allow an attacker to execute hostile code as root, granting them administrative access to the system.