wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121If a malicious payload is inserted into the related path and the service is executed in any way, this can gain new privilege access to the system and perform malicious acts.
MotoCMS Version 3.4.3 SQL Injection via the keyword parameter.
The web interface of the STARFACE PBX in version 7.3.0.10 allows for authentication with a password hash. The JavaScript file 'prettifier.js' adds the 'secret' and 'ack' parameters to the login form before submission. The 'defaultVals' JavaScript object contains the static hash of the PBX version.
Enrollment System Project V1.0, developed by Sourcecodester, has been found to be vulnerable to SQL Injection (SQLI) attacks. This vulnerability allows an attacker to manipulate the SQL queries executed by the application. The system fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code. By exploiting this vulnerability, an attacker can bypass authentication and gain unauthorized access to the system.
MotoCMS Version 3.4.3 Store Category Template was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the keyword parameter.
Using the REST-API of Pydio Cells it is possible to start jobs. For example, when renaming a file or folder an HTTP request similar to the following is sent: PUT /a/jobs/user/move HTTP/2 Host: example.com User-Agent: agent Accept: application/json Authorization: Bearer G4ZRN[...] Content-Type: application/json Content-Length: 140 { "JobName": "move", "JsonParameters": "{"nodes"":[""cell/file.txt""]
When a file named 'xss.html' is downloaded in the Pydio Cells web application, a download URL is generated. The URL contains a parameter 'response-content-disposition' which is set to 'attachment' causing the browser to download the file instead of interpreting it. The URL also contains a signature, expiry timestamp, and the user's JWT for authentication. The access key with the ID 'gateway' is referenced, which can be found in the JavaScript sources of Pydio Cells together with the secret.
This exploit allows an attacker to upload files to the Faculty Evaluation System 1.0 without authentication, potentially leading to remote code execution. The vulnerability exists in the login.php page, which does not properly validate user input.
The Online Security Guards Hiring System version 1.0 is vulnerable to a reflected XSS attack. This allows an attacker to execute malicious scripts in the victim's browser, potentially leading to unauthorized access or data theft.
This module triggers a Denial of Service vulnerability in the Flexense HTTP server. Vulnerability caused by a user mode write access memory violation and can be triggered with rapidly sending variety of HTTP requests with long HTTP header values. Multiple Flexense applications that are using Flexense HTTP server 10.6.24 and below vesions reportedly vulnerable.