wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121This exploit takes advantage of a buffer overflow vulnerability in RM Downloader version 3.1.3.2.2010.06.13. By crafting a specially crafted payload and pasting it into the 'Load' parameter of the application, an attacker can trigger a buffer overflow and potentially execute arbitrary code.
The P5 FNIP-8x16A/FNIP-4xSH controller suffers from CSRF and XSS vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several GET/POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
NSClient++ is a monitoring agent that has the option to run external scripts. This feature can allow an attacker, given they have credentials, the ability to execute arbitrary code via the NSClient++ web application. Since it runs as NT Authority/System bt Default, this leads to privileged code execution.
IQrouter firmware up to 3.3.1 allows remote code execution via multiple vulnerabilities.
This module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root.
This exploit allows an attacker to bypass ASLR and SEH protections in Nsauditor version 3.2.1.0 and 3.0.28.0. By sending a specially crafted DNS query, an attacker can trigger a buffer overflow vulnerability and overwrite three bytes of memory. The exploit includes a customizable shellcode that can be used to execute arbitrary commands.
This is a public exploit for WebPortal-0.6-beta CMS and possibly lower versions. The exploit allows remote attackers to change passwords of users on the affected system.
The Cisco IP Phone 11.7 is vulnerable to a Denial of Service (DoS) attack. By sending a specially crafted request to the device, an attacker can cause the phone to become unresponsive and stop functioning. This can disrupt communication and potentially impact business operations. The vulnerability has been assigned CVE-2020-3161.
The Easy MPEG to DVD Burner version 1.7.11 is vulnerable to a buffer overflow vulnerability which can be exploited to bypass SEH and DEP protection. The exploit uses the VirtualProtect() function to gain control over the application. The exploit has been tested on Windows 7 Ultimate x64.
This module exploits a vulnerability in Apache Solr <= 8.3.0 which allows remote code execution via a custom Velocity template. Currently, this module only supports Solr basic authentication. An attacker could target a vulnerable Apache Solr instance by first identifying a list of Solr core names. Once the core names have been identified, an attacker can send a specially crafted HTTP POST request to the Config API to toggle the params resource loader value for the Velocity Response Writer in the solrconfig.xml file to true. Enabling this parameter would allow an attacker to use the Velocity template parameter in a specially crafted Solr request, leading to RCE.