wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121The D-Link DIR-615 Wireless Router is vulnerable to persistent cross-site scripting. An attacker can inject malicious script into the name field, which gets saved by the server and is reflected on the user page. This allows the attacker to execute the script and gather sensitive information from the victim, such as IP, cookies, and user agent. Additionally, HTML injection is possible by inserting HTML tags into the username field.
This exploit allows an attacker to trigger a stack overflow vulnerability in FTP Commander Pro version 8.03 and execute arbitrary code on the target system. The vulnerability occurs when a specially crafted payload is sent to the FTP server, causing the program to crash and open the calculator application.
This module exploits a command injection in OpenNetAdmin between 8.5.14 and 18.1.1.
A vulnerability in pmdrvs.sys driver has been discovered in Lenovo Power Management Driver. The vulnerability exists due to insufficient input buffer validation when the driver processes IOCTL codes. Attackers can exploit this issue to cause a Denial of Service or possibly execute arbitrary code in kernel space.
The websihirbazi v5.1.1 script is vulnerable to a remote blind SQL injection attack. An attacker can exploit this vulnerability to extract sensitive information from the database.
AppXSvc improperly handles file hard links resulting in a low privileged user being able to overwrite an arbitrary file leading to elevation of privilege.
The mmsLamp application is vulnerable to SQL injection. An attacker can manipulate the 'idpro' parameter in the 'default.php' script to execute arbitrary SQL queries. This can lead to unauthorized access, data leakage, or even remote code execution.
This exploit targets a local buffer overflow vulnerability in SpotAuditor 5.3.2. By sending a specially crafted payload, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow.
This exploit allows an attacker to bypass authentication in the administration panel of PRO-7070 Hazir Profesyonel Web Sitesi 1.0. By using the username '=' 'or' and password '=' 'or', the attacker can gain unauthorized access to the panel.
This exploit demonstrates a UAC bypass technique by mocking trusted directories. It utilizes wsreset.exe to execute arbitrary code with elevated privileges.