wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114Exploit allows malicious users to grab files from the server without being authenticated completely bypassing security.
This code exploits a format bug in the site exec cmd of BeroFTPD 1.3.4(1), which is derived from wuftpd sources. The format bug is well known to be present in wuftpd-2.6.0 and derived daemons.
Marwel is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
ODFaq is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
Direct News is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
ContentServ is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
The vulnerability allows an attacker to execute arbitrary script code in the browser of an unsuspecting user by injecting malicious code through user-supplied input. This can lead to the theft of authentication credentials and other attacks.
This exploit crashes the Kate's Video Toolkit application when a specific .wav file is added to the Mix section of the application.
This exploit is a local stack based buffer overflow in BlazeDVD Pro player version 6.1. It allows an attacker to execute arbitrary code by sending a specially crafted file to the vulnerable software.
Lighthouse is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.