wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114The script contains a buffer overflow vulnerability that can be exploited by sending a GET request with a large size parameter. This causes the program to crash with a segmentation fault, potentially leading to remote code execution.
Multiple persistant cross site & a blind SQL vulnerabilities are detected on the resource management tool Achievo v1.4.3. The bug allows remote attacker to implement malicious script code on the application side and/or to execute sql commands via remote sql injection attack. Successful exploitation of the vulnerability allows an attacker to manipulate specific modules & can lead to session hijacking (user/mod/admin) and/or to compromise the application & dbms.
This module exploits a vulnerability in Icona SpA C6 Messenger 1.0.0.1. The vulnerability is in the DownloaderActiveX Control (DownloaderActiveX.ocx). The insecure control can be abused to download and execute arbitrary files in the context of the currently logged-on user.
The SID parameter in a POST is vulnerable to a boolean based blind SQLi. You must be authenticated to access this parameter. The default database for Campaign Enterprise is MS Access.
The HostBill script is suffering from a remote injection vulnerability in the PHP code. An attacker can exploit this vulnerability by injecting malicious PHP code into the subject field of the new ticket form.
This exploit allows an attacker to create a folder with a specially crafted SID parameter in the Sysax Multi Server version 5.50. The vulnerability was discovered on January 13, 2012 and a fix was released on January 17, 2012 in version 5.52. The exploit has been tested on XP SP3 32bit and Server 2003 SP2 32bit without DEP.
User could call a remote script to download arbitrary file from the target system. Another script was vulnerable to non-persistent XSS
WorldMail IMAPD - SEH overflow - remote exploit
This exploit takes advantage of a stack buffer overflow vulnerability in Blade API Monitor. By sending a specially crafted request, an attacker can execute arbitrary code on the target system.
W-CMS is vulnerable to cross-site scripting (XSS) attacks and directory traversal attacks. The XSS vulnerability can be exploited through the 'index.php' and '?p=' parameters, allowing an attacker to inject malicious scripts. The directory traversal vulnerability allows an attacker to access sensitive files on the server by manipulating the 'p' parameter.