wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114A vulnerability in the upload.asp script of iisCart2000 allows an attacker to upload arbitrary files to a vulnerable server. This can lead to the execution of attacker-supplied code.
Baby FTP Server does not properly handle some types of requests, allowing a remote user to gain access to resources outside of the FTP root directory.
A SQL Injection vulnerability is detected in the BananaDance Wiki B2.2 Content Management System. The vulnerability allows an attacker (remote) or local privileged moderator/admin user account to execute own SQL commands on the affected application dbms. Multiple persistent input validation vulnerabilities are also detected in the BananaDance Wiki B2.2 CMS. The bugs allow remote attackers to implement/i...
The product will crash when scanning a malicious .dll generated using the provided script. The script adds 49 bytes of malicious byte (represented with x41) into the .dll file, right after the PE (x50x45) header on the 244th byte of the file.
This is a proof-of-concept code for the MS06-040 vulnerability, which allows remote code execution. It is tested against Windows XP SP1 and Windows 2000 SP4. The affected systems include Microsoft Windows 2000 SP0-SP4, Microsoft Windows XP SP0-SP1, and Microsoft Windows NT 4.0.
Vignette is prone to an issue which may expose the contents of memory to remote attackers. This condition is due to a flaw in how StoryServer calculates the size of certain characters in URI variables, which may cause data from adjacent memory to be returned to the remote attacker in the response.
A format string vulnerability has been reported for Magic Winmail Server when processing the USER POP3 command. An attacker may exploit this vulnerability by connecting to the vulnerable mail server and issuing the USER command with malicious format string specifiers. This may result in the corruption of sensitive memory.
The vulnerability in Snowblind causes the web server to crash when processing a malformed HTTP request.
A remote attacker can inject SQL into queries made by the register.asp script, potentially resulting in disclosure of sensitive information or modification of data. This vulnerability may also be leveraged to exploit vulnerabilities in the underlying database.
MySQL has been reported to implement a weak password encryption algorithm. It has been reported that the MySQL function used to encrypt MySQL passwords makes just one pass over the password and employs a weak left shift based cipher. The hash may be cracked in little time using a bruteforce method. An attacker may use information recovered in this way to aid in further attacks launched against the underlying system.