wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114This exploit targets the InterTech Co 1.0 application and includes multiple vulnerabilities. One of the vulnerabilities is a SQL injection vulnerability that can be exploited by injecting SQL code in the 'id' parameter of the 'etemplate.php' page.
The exploit allows an attacker to perform an SQL injection attack by manipulating the 'rental_id' parameter in the 'CalendarView' module of the vacation Rental Script. By injecting malicious SQL code, the attacker can retrieve sensitive information such as the admin's name and password.
The video games rentals Script is vulnerable to SQL injection. An attacker can exploit this vulnerability by injecting malicious SQL code into the 'pfid' parameter of the 'index.php' page. This can lead to unauthorized access, data manipulation, and potential compromise of the database.
This is an exploit for a local buffer overflow vulnerability in the Radasm .rap file. The vulnerability allows an attacker to execute arbitrary code on the target system.
This vulnerability is a DoS vulnerability that can be exploited by an attacker to cause an access violation exception in the target system. The vulnerability is caused by a flaw in the target object's ShowDlg function, which can be triggered by passing a specially crafted argument. This results in a memory read attempt at the address 0x00000020, leading to an access violation exception (0xC0000005).
This vulnerability allows an attacker to disclose the database of J.A.G (Just Another Guestbook) version 1.14. By accessing the URL http://site.com/path/jag/database.sql, the attacker can retrieve the database contents.
The vulnerability is in the field "title" scenario "calendar.php". An attacker can inject malicious JavaScript code into the title field of a calendar event, which will be executed when the event is viewed. This allows the attacker to steal the victim's cookies.
This is a proof of concept exploit for a local buffer overflow vulnerability in Radasm .rap file. The vulnerability is present in the filename field.
A vulnerability has been discovered in osTicket, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the "input" parameter to ajax.php is not properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is confirmed in version 1.6 RC5. Other versions may also be affected.
This exploit targets the feedDemon opml file and causes a buffer overflow.