wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121This module exploits an arbitrary file write vulnerability in the Netscape Portable Runtime library (libnspr) on unpatched Solaris systems prior to Solaris 10u3 which allows users to gain root privileges. libnspr versions prior to 4.6.3 allow users to specify a log file with the `NSPR_LOG_FILE` environment variable. The log file is created with the privileges of the running process, resulting in privilege escalation when used in combination with a SUID executable. This module writes a shared object to the trusted library directory `/usr/lib/secure` and runs the specified SUID binary with the shared object loaded using the `LD_LIBRARY_PATH` environment variable. This module has been tested successfully with libnspr version 4.5.1 on Solaris 10u1 (01/06) (x86) and Solaris 10u2 (06/06) (x86).
When object header inlining is deoptimized, the type handler of the object is converted to a dictionary type handler. The problem is that it doesn't consider some attributes that dictionary type handlers don't have, so adding or removing those attributes can fail. ObjectSlotAttr_Accessor which indicates that the property is an accessor is one of them.
The PHPDJ v05 (page) is vulnerable to remote file inclusion. By exploiting this vulnerability, an attacker can include a malicious file from a remote server, which can lead to remote code execution or other attacks.
The Uplay desktop client does not properly validate user-controlled data passed to its custom uplay URI protocol handler. This flaw can be used to exploit the Chromium Embedded Framework (CEF) integrated within the Uplay client, allowing for arbitrary code execution.
A stack buffer overflow exists in the cgi_system binary. The error occurs due to lack of bounds checking on the PHPSESSID value before and when it is passed to sprintf in order to generate the session id file name. As written, this exploit enables Telnet. Executes a command via the stack buffer overflow in cookie parsing. The command is executed via 'system' as root.
CA Release Automation (NiMi) Remote Command Execution via Deserialization. Payloads generated using CommonsCollections1 from ysoserial work correctly. Proof of Concept exploits NiMi service if security is turned off.
Improper input validation on the router web interface allows attackers to add a persistent Cross-Site scripting attack on the Dynamic DNS hostname field. Simply intercept a renaming request and add in the XSS
This exploit allows an attacker to bypass the HTTP basic authentication in Boa web server version 0.93.15 with Intersil Extensions. The attacker can gain unauthorized access to protected resources without providing valid credentials.
This exploit allows an attacker to cause a denial of service by crashing the XAMPP Control Panel. By creating a large payload and pasting it into specific fields in the control panel, the program will crash.
This exploit creates a malicious file named 'exploit.txt' that, when opened with InfraRecorder version 0.53, causes the program to crash. The exploit script uses a buffer overflow to create a payload of 6000 characters.