wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114Appian Business Process Management Suite (BPMS) is prone to a remote denial-of-service vulnerability because it fails to handle specially crafted packets. Successfully exploiting this issue allows remote attackers to crash the affected application, denying further service to legitimate users.
The Perl Net::DNS module is prone to a remote denial-of-service vulnerability because the module fails to properly handle malformed DNS responses. Successfully exploiting this issue allows attackers to crash applications that use the affected module.
PeerCast is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer. Successfully exploiting these issues will allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application.
PHP Security Framework is prone to multiple input-validation vulnerabilities, including multiple SQL-injection issues and remote file-include issues. A successful exploit may allow an attacker to execute malicious code within the context of the webserver process, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The Neuron News application is prone to multiple input-validation vulnerabilities, including an SQL-injection issue and two cross-site scripting issues. These vulnerabilities exist because the application fails to sufficiently sanitize user-supplied data. An attacker can exploit these issues to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Flyspray is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Black Sheep Web Software Form Tools is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
The QUOTE&ORDERING SYSTEM 1.0 (ordernum) is vulnerable to SQL Injection and XSS attacks. These vulnerabilities allow an attacker to execute arbitrary SQL queries and inject malicious scripts into the application.
The vulnerability allows unauthorized users to read draft posts in WordPress before they have been published. An attacker can exploit this issue by accessing a specific URI.
The SQL injection vulnerability and session vulnerability in phpRPG allow unauthorized users to steal sessions, access or modify data, or exploit latent vulnerabilities in the underlying database.