wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114This exploit allows remote code execution in PH Pexplorer version 0.24. By uploading an evil file and setting the 'Language' cookie to the path of the evil file, an attacker can run the evil file on all script pages.
This modules exploits a vulnerability found in the Oracle WebCenter Content CheckOutAndOpenControl ActiveX. This vulnerability exists in openWebdav(), where user controlled input is used to call ShellExecuteExW(). This module abuses the control to execute an arbitrary HTA from a remote location. This module has been tested successfully with the CheckOutAndOpenControl ActiveX installed with Oracle WebCenter Content 11.1.1.6.0.
SlimServe HTTP server is vulnerable to directory traversal attacks, which allow malicious users to read files outside of the web server root directory. An attacker can exploit this vulnerability by sending a crafted HTTP request containing '../' sequences to access sensitive files on the server.
A remote denial of service vulnerability affects Raven Software Soldier Of Fortune 2. The problem presents itself specifically when the affected server application receives an excessively large value through a '/ignore' command from a malicious client. An attacker may leverage this issue to cause an affected server to crash, denying service to legitimate users.
Phoroum is prone to SQL injection attacks. Insufficient sanitization of user input may allow a malicious user to manipulate the structure and logic of database queries. Successful exploitation could allow the attacker to compromise security properties of the application and the database. Possible consequences include unauthorized access to the application and database.
There's a bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec doesn't initialise the next list pointer.
Tru64 5 su exploit allows an attacker to execute arbitrary code with root privileges by exploiting a buffer overflow vulnerability in the su command. The exploit code contains a shellcode that will be executed to gain root access.
BOINC Manager 7.0.64 is vulnerable to a field stack based buffer overflow. An attacker can exploit this vulnerability by convincing the victim to use a very long URL as the Account Manager URL. This can be done by generating the URL using the provided exploit. The severity of this vulnerability is low.
The Forum Russian Board is prone to multiple input validation vulnerabilities. These issues can allow attackers to carry out SQL Injection, cross-site scripting, and HTML injection attacks.
This is a vulnerability in ClamAV that allows an attacker to cause a denial of service by sending a specially crafted CHM file. The vulnerability is due to a flaw in the handling of CHM chunk names, which can be exploited to crash the application. The vulnerability was discovered by Damian Put and all credits go to him.