wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121A reflected Cross-Site Scripting (XSS) vulnerability exists in orangescrum 1.8.0 when an authenticated user sends a maliciously crafted request to the application. The application does not properly sanitize user-supplied input, allowing an attacker to inject arbitrary HTML or JavaScript code into the application’s response. This can be exploited to execute arbitrary HTML or JavaScript code in the context of the affected application.
The vulnerabilities in the application allow for taking over any account with which the project is assigned. The user must be assigned to the project with the account he wants to take over. The exploit involves going to the dashboard, going to the page source view, finding in source 'var PUSERS', copying 'uniq_id' victim, changing cookie 'USER_UNIQ' to 'USER_UNIQ' victim from page source and after refreshing the page, logging in to the victim's account.
A client-side template injection vulnerability in Bagisto 1.3.3 allows an attacker to inject arbitrary JavaScript code into the application. An attacker can exploit this vulnerability by registering an account and editing their profile name and address with a malicious payload. When an administrator or any other user views the profile or order, the malicious code will be executed.
CMSimple 5.4 is vulnerable to Local file inclusion (LFI) to Remote code execution (RCE) when an authenticated user is present. An attacker can exploit this vulnerability by changing the functions_file parameter to php://input and sending a malicious payload to the server. This will allow the attacker to execute arbitrary code on the server.
An attacker can compromise the database of the application using some automated(or manual) tools like SQLmap. An attacker can dump the database of the application remotely.
Webrun version 3.6.0.42 is vulnerable to SQL Injection, applied to the P_0 parameter used to set the username during the login process. In the post request, change the P_0 value to the following payload: 121')+AND+5110%3dCAST((CHR(113)||CHR(118)||CHR(118)||CHR(120)||CHR(113))||(SELECT+(CASE+WHEN+(5110%3d5110)+THEN+1+ELSE+0+END))%3a%3atext||(CHR(113)||CHR(98)||CHR(122)||CHR(98)||CHR(113))+AS+NUMERIC)+AND+('AYkd'%3d'AYkd. If the return has the value 'qvvxq1qbzbq', you will be able to successfully exploit this.
This exploit allows an attacker to gain access to sensitive information from the WP Guppy plugin by using the WP_JSON API. The attacker can use the exploit to get all users, send messages from/to other users, and get the chats between users.
GNU gdbserver is vulnerable to a Remote Command Execution (RCE) vulnerability. An attacker can send a specially crafted packet to the gdbserver, which will execute arbitrary code on the target system. The vulnerability is due to the lack of proper validation of user-supplied input when handling the 'vCont' command. This allows an attacker to send a malicious payload to the gdbserver, which will be executed on the target system.
The Aimeos E-Commerce framework Laravel application is vulnerable to SQL injection via the 'sort' parameter on the json api.
Smart Product Review is a WordPress plugin developed by CodeFlip that allows users to add reviews to their products. The plugin version 1.0.4 is vulnerable to an arbitrary file upload vulnerability. An attacker can upload a malicious file to the server and gain remote code execution. This vulnerability can be exploited by an unauthenticated attacker.