wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114The E-vanced Solutions E-vents application is prone to multiple input-validation vulnerabilities due to insufficient sanitization of user-supplied data. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The GWExtranet application is prone to multiple directory-traversal vulnerabilities due to improper sanitization of user-supplied input. An attacker can exploit these vulnerabilities to retrieve arbitrary files from the vulnerable system in the context of the webserver process, potentially obtaining sensitive information that may aid in further attacks.
The VUNET Case Manager application fails to properly sanitize user-supplied data before using it in an SQL query. This allows an attacker to inject malicious SQL code, potentially compromising the application and gaining unauthorized access to or modifying data. It may also expose latent vulnerabilities in the underlying database.
The Mass Mailer application is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Attackers can exploit this issue to gain unauthorized access to the application. Successful attacks will compromise the affected application and possibly the underlying webserver.
The application fails to handle specially crafted packets, leading to remote denial-of-service conditions.
Aratix inc/init.inc.php does not initialize the $current_path variable before using it to include files, assuming register_globals = on, we can initialize the variable in a query string and include a remote file of our choice.
This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed XFDL files, with a long fontname value. This module has been tested successfully on IBM Forms Viewer 4.0 on Windows XP SP3 and Windows 7 SP1.
The vulnerability allows attackers to execute arbitrary code in the context of the user running the Mail application. This can compromise the application and potentially the underlying operating system.
The vulnerability allows a local attacker to gain elevated privileges on the affected computer by exploiting a flaw in ISPmanager. By executing a specific command, the attacker can access sensitive information and compromise the affected computer.