wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114This exploit allows an attacker to execute arbitrary code on a remote IceBB 1.0-rc5 installation. The attacker needs to register a user and then run the exploit with the specified parameters. After successful execution, the attacker can login with admin access.
This vulnerability allows an attacker to execute arbitrary code by enticing a legitimate user to open a specially crafted Dynamic Linked Library (DLL) file from a network share location using the vulnerable Microsoft Windows Live Messenger application.
The vulnerability exists due to insufficient sanitization of user-supplied data in Kentico CMS. An attacker can exploit this issue by injecting arbitrary script code in the browser of a victim user, potentially leading to the theft of authentication credentials and other attacks.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Successful exploits will allow remote attackers to execute arbitrary code within the context of the affected application.
NetVault: SmartDisk is prone to a remote denial-of-service vulnerability. A successful exploit will cause the application to crash, effectively denying service. Remote code execution may be possible; however, this has not been confirmed.
Cotonti is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
Blackboard Learn is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
An attacker can exploit a weakness in Asterisk to harvest valid usernames, which can be used in brute-force attacks.
The RXS-3211 IP camera is vulnerable to an information-disclosure exploit. An attacker can use a proof of concept to gain access to sensitive information. This information can be used for further attacks.