wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121The Student Study Center Management System V1.0, developed by PHPGurukul, is susceptible to a critical security vulnerability known as Stored Cross-Site Scripting (XSS). This vulnerability enables attackers to inject malicious JavaScript code, which is then stored and executed by the application. The underlying issue lies in the system's failure to adequately sanitize and validate user-provided input within the "Admin Name" field on the Admin Profile page, thereby allowing attackers to inject arbitrary JavaScript code.
The Jobpilot v2.61 application is vulnerable to SQL Injection. The vulnerability can be exploited through the 'long' parameter in a GET request. The exploit allows an attacker to execute arbitrary SQL queries, potentially gaining unauthorized access to the database. The PoC includes error-based and time-based blind SQL injection payloads.
This exploit allows an attacker to perform SQL injection on the Groomify v1.0 application. By manipulating the 'search' parameter in the 'blog-search' endpoint, an attacker can execute arbitrary SQL queries.
The Shop v2.5 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by manipulating the 'qty' parameter in a POST request. The payload can be injected to execute arbitrary SQL queries.
Online Art Gallery Project 1.0 allows unauthenticated users to perform arbitrary file uploads via the adminHome.php page. Due to the absence of an authentication mechanism and inadequate file validation, attackers can upload malicious files, potentially leading to remote code execution and unauthorized access to the server.
The Textpattern CMS v4.8.8 is vulnerable to stored cross-site scripting (XSS) attacks. An authenticated user can inject malicious JavaScript code into the Excerpt field of the Articles section in the admin page. When this payload is executed, it will trigger an alert displaying the user's cookie information.
The password parameter in the Online Thesis Archiving System v1.0 is vulnerable to SQL injection attacks. An attacker can inject a payload that executes a SQL sub-query, allowing them to dump all information from the database.
This exploit allows an authenticated user to inject arbitrary HTML or JavaScript code into the Xoops CMS admin panel. By adding a malicious payload in the Category Name field of the Image Manager, an attacker can execute a stored XSS attack. The payload '<script>alert(1)</script>' is used as an example.
This exploit allows an attacker to inject malicious scripts into the Monstra CMS admin panel. By editing a page and inserting a payload in the Name field, an attacker can execute arbitrary JavaScript code on the affected website.
The projectSend application version r1605 is vulnerable to a stored XSS attack. An attacker can exploit this vulnerability by injecting malicious JavaScript code in the Custom Html/Css/Js section. This code will be executed whenever a user visits the affected page, potentially leading to unauthorized actions or data theft.