wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121Nuts CMS is vulnerable to php code injection due to improper input validation. An attacker can exploit this vulnerability by sending a malicious HTTP request to the vulnerable server with a payload that will be executed on the server.
The Sagemcom modem does not authenticate users when requesting pages, only whilst posting forms. The password.html page loads the admin password in clear text and stores it in Javascript, which is viewable without any credentials.
A remote code execution vulnerability exists in Microsoft Windows HTA (HTML Application) due to improper validation of user-supplied input. An attacker could exploit this vulnerability by convincing a user to open a specially crafted HTA file. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code in the context of the current user.
MASM32 quick editor .QSE SEH Based Buffer Overflow (ASLR & SAFESEH bypass) is a vulnerability that allows an attacker to execute arbitrary code by overflowing a buffer and overwriting the SEH handler. The exploit uses a 95 bytes Little Joke shellcode to shutdown the system. The exploit bypasses ASLR and SAFESEH by using an opcode (e2) that makes the instruction 8ce2 (MOV DX,FS) and the execution flow can be continued.
This exploit is a proof of concept for a local crash in XMPlay. It creates a .pls file with a large number of 'pwned' characters, which causes a stack overflow when the file is opened in XMPlay.
The vulnerability allows an attacker to bypass authentication of the Star Vision DVR IP Camera. The attacker can open the Chrome browser, enter the IP address or domain to see the login screen of the camera, press the F12 key to open the browser console, click the Console tab and enter the code 'login_set(1,1,1,1);'. Then, the attacker can go to page view2.html and access the camera.
A buffer overflow vulnerability exists in the NetKit FTP client in Ubuntu 14.04. An attacker can exploit this vulnerability by sending a specially crafted FTP command containing an overly long string to the FTP server. This will cause the application to crash, resulting in a denial of service condition.
This exploit is used to crash the Ability FTP Server Admin Panel by sending a large number of 'authcode' commands to the server. This exploit was discovered by St0rn in 2015 and affects version 2.1.4 of the Ability FTP Server.
Ability FTP Server is vulnerable to a remote denial of service attack. By sending a specially crafted USER command with an overly long argument, an attacker can cause the server to crash. This vulnerability affects Ability FTP Server version 2.1.4 and prior.
Normal user can inject sql query in the url which lead to read data from the database.