wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114On the login page, entering 'admin' as the username and '' or '1'='1' as the password allows the attacker to bypass authentication and gain access to the system.
This exploit is a stack buffer overflow in Mini-Stream RM-MP3 Converter v3.1.2.1 when parsing a specially crafted .pls file. The vulnerability allows an attacker to execute arbitrary code by overwriting the return address on the stack and redirecting the program flow to the attacker's shellcode.
The vulnerability allows an attacker to execute SQL commands on the database through the 'id' parameter in the 'articlesdetails.php' script.
This exploit allows an attacker to perform remote SQL injection on the BS Script Directory software. By manipulating the 'id' parameter in the 'info.php' file, an attacker can inject malicious SQL queries and potentially gain unauthorized access to the database.
The vulnerability allows an attacker to inject malicious scripts into the website by exploiting the Campsite CMS. The attacker can achieve this by logging in as an admin and going to the administration section, specifically the articles editing option. In the heading or content section, the attacker can insert the following script: <marquee><h1>XSS3d By D4rk357</h1><marquee>. Another method for exploiting this vulnerability is for a user to upload a persistent XSS while submitting an article on the website using the same method.
The 2daybiz Businesscard Script suffers from an authentication bypass vulnerability. By using the string "a or 1=1" in the username and password fields, an attacker can bypass the login process.
Corel WordPerfect Office X5 is prone to a remote buffer overflow vulnerability because the application fails to perform adequate boundary checks on user supplied input with .WPD (WordPerfect Document) file. Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.
This VBS script exploits a vulnerability to create a bind shell on port 4444. The script contains shellcode that is executed when the script is run. The shellcode sets up a listener on port 4444 and allows remote attackers to connect and execute commands on the target system.
A vulnerability in the Firestats plugin for Wordpress allows an attacker to download the configuration file, which contains sensitive information such as the database username and password.
The b2evolution 3.3.3 application is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can create a malicious HTML page that will make a request to the targeted b2evolution admin panel, tricking the authenticated user into performing unintended actions on their behalf.