wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114The application fails to properly sanitize user-supplied input, allowing an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can be used to steal authentication credentials and launch further attacks.
PHP Accounts is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The PHP Accounts application is prone to a local file-include vulnerability. This vulnerability occurs due to a failure in properly sanitizing user-supplied input. By exploiting this vulnerability, an unauthorized user can view files and execute local scripts.
This exploit targets a remote code execution vulnerability in Microsoft ASN.1. It is specifically for CVE-2005-1935, also known as MS04-007. The exploit allows an attacker to execute arbitrary code on a vulnerable system.
An attacker can exploit this issue to access sensitive information that may lead to further attacks.
BugHunter HTTP Server is prone to an information-disclosure vulnerability. An attacker can exploit this issue to gain access to sensitive information. Information obtained may lead to further attacks.
The Wrapper.php file in OsCommerce is vulnerable to a local file-include vulnerability. This vulnerability occurs due to inadequate input sanitization. An attacker can exploit this vulnerability by supplying malicious input to the 'file' parameter in the URL. Successful exploitation could allow the attacker to view sensitive files and execute arbitrary local scripts.
This module exploits a SQL injection vulnerability found in vBulletin 5 that has been used in the wild since March 2013. This module uses the sqli to extract the web application's usernames and hashes. With the retrieved information tries to log into the admin control panel in order to deploy the PHP payload. This module has been tested successfully on VBulletin Version 5.0.0 Beta 13 over an Ubuntu Linux distribution.
The 'DPA Illuminator' service (DPA_Illuminator.exe) listening on public port 8090 (tcp/http) and 8453 (tcp/https) is vulnerable. It exposes the following servlet: http://[host]:8090/invoker/EJBInvokerServlet https://[host]:8453//invoker/EJBInvokerServlet due to a bundled invoker.war. The result is remote code execution with NT AUTHORITYSYSTEM privileges. Proof of concept URL: http://retrogod.altervista.org/9sg_ejb.html https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30211.tgz
This exploit allows remote attackers to gain root access on ProFTPd servers. The exploit code is available at the provided link.