wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114A buffer overflow vulnerability can occur in lchangelv under some versions of AIX. An attacker must already have the GID or EGID of 'system' to execute lchangelv. Because lchangelv is SUID root, this overflow will grant the attacker root privileges.
This module exploits a vulnerability in Adobe Flash Player versions 10.3.181.23 and earlier. This issue is caused by a failure in the ActionScript3 AVM2 verification logic. This results in unsafe JIT(Just-In-Time) code being executed. This is the same vulnerability that was used for attacks against Korean based organizations. Specifically, this issue occurs when indexing an array using an arbitrary value, memory can be referenced and later executed. Taking advantage of this issue does not rely on heap spraying as the vulnerability can also be used for information leakage. Currently this exploit works for IE6, IE7, IE8, Firefox 10.2 and likely several other browsers under multiple Windows platforms. This exploit bypasses ASLR/DEP and is very reliable.
This exploit allows an attacker to execute arbitrary code on a vulnerable Sysax <= 5.62 Admin Interface. The vulnerability occurs due to a buffer overflow in the login function. By sending a specially crafted GET request, an attacker can overwrite the return address and gain control of the program execution flow. The exploit payload is a shellcode that creates a bind shell on port 4444.
Certain versions of AIX ship with an Information Daemon, infod. This program is designed to provide information about the OS and installed ancilliary programs. The daemon which runs as root, does not check credentials which are passed to it. This allows users to pass requests with arbitrary UID's. If a user passes infod a request as root, they can goto the default options menu and change the printer command line to an alternate binary such as /bin/sh that gives privileges to the account the session was spawned under.
Buffer overflow condition exist in URL handling, sending long GET request will cause server process to exit and may allow malicious code injection. Further research found that the application does not care about the HTTP method, so that by sending long characters will make the program crash.
Total Video Player has no correct input handling and will hang, when trying to open malformed .m3u files. .mp3 and .avi files are affected too
The netstd package in Debian GNU/Linux is vulnerable to two buffer overflow attacks. The first vulnerability is present in the bootp server, while the second vulnerability exists in the FTP client. The bootp server vulnerability can allow a remote attacker to fully compromise a vulnerable host by exploiting improper bounds checking in the handling of boot file/location specified in a bootp request packet and in the error logging facility. The FTP client vulnerability can be exploited by a local attacker to potentially elevate privileges.
The autofs kernel module does not check the size of the directory names it receives. It is passed the name and the names length through dentry->d_name.name and dentry->d_name.len respectively. Later on, it memcpy()'s the name into a 256 byte buffer, using dentry->d_name.len as the number of bytes to copy, without checking its size. A nonprivileged user may attempt to cd to a directory name exceeding 255 characters. This overwrites memory, probably the kernel stack and anything beyond it, and causes kernel errors or makes the machine reboot.
Microsoft IIS reported prone to a buffer overflow vulnerability in the way IIS handles requests for several file types that require server side processing. This vulnerability may allow a remote attacker to execute arbitrary code on the target machine.
The man command creates a temporary file under /tmp with a predictable name and is willing to follow symbolic links. This allows malicious local users to create arbitrarily named files by creating symbolic links to desired files.