wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114SetSeed CMS is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the vulnerable script using the cookie input 'loggedInUser', which could allow the attacker to view, add, modify or delete information in the back-end database.
This proof-of-concept (PoC) creates a .oce file that can be used to exploit a stack-based buffer overflow vulnerability in Hyperion Interactive Reporting Studio, which is part of the Oracle Hyperion Suite. When the file is clicked, a login box appears followed by an error message, leading to a crash.
The vulnerability allows an attacker to cause a denial of service condition in Google Chrome. However, no way to exploit the vulnerability has been found.
This exploit allows an attacker to execute arbitrary code on a system running UnrealIRCd. By adding a malicious entry to the unrealircd.conf file, an attacker can trigger a stack overflow and gain control of the target system.
This script is riddled with unsanitized REQUEST variables that allow multiple SQL injections. The PoC shows an example of an SQL injection attack. The vulnerable code is shown on line 150 of discussion.php file.
This exploit takes advantage of a vulnerability in the member_menu_queries.php file of the Dolphin software version 7.0.7 or below. By manipulating the 'bubbles' parameter in the URL, an attacker can inject arbitrary PHP code into the server.
The Mozilla Firefox browser is vulnerable to an integer overflow exploit in the Array.reduceRight() function. This vulnerability allows an attacker to bypass DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization) protections using a Java MSVCR71 sayonara rop chain. The exploit has been tested on Windows 7 Ultimate with Firefox versions 3.6.16 and 3.6.17.
The exploit allows an attacker to perform SQL injection by modifying the POST request in the userbarsettings.php file.
myBB is a popular open source PHP forum software. Version 1.6.4 contained an unauthorized backdoor, distributed as part of the vendor's source package.
This module exploits an arbitrary command execution vulnerability in nmap.php and nbtscan.php scripts.