wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114The Yoggie Pico and Pico Pro devices are vulnerable to a remote code-execution vulnerability due to insufficient input sanitization. An attacker can exploit this vulnerability to execute arbitrary code with superuser privileges, leading to a complete compromise of the affected devices. The attacker can replace the original /etc/shadow file to set the root password of their choosing and gain complete control over the device by running dropbear sshd on a specific port.
Claroline is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
The Oracle Rapid Install Web Server is vulnerable to a cross-site scripting (XSS) attack due to inadequate input sanitization. An attacker can exploit this vulnerability by injecting malicious HTML and script code into the victim's browser. This can lead to the theft of authentication credentials and enable further attacks.
PC SOFT WinDEV is prone to a stack-based buffer-overflow vulnerability when it attempts to process malformed project files. This issue occurs because the application fails to perform proper bounds-checking on user-supplied data before copying it to an insufficiently sized memory buffer. An attacker may exploit this issue to execute arbitrary code with the privileges of the user running the vulnerable application or to cause denial-of-service conditions. This may facilitate unauthorized access or privilege escalation.
The Linksys Wireless-G ADSL Gateway is prone to multiple cross-site scripting vulnerabilities due to inadequate input sanitization. Attackers can exploit this by enticing victims to open a malicious URI. This can lead to the execution of arbitrary script code in the user's browser within the context of the affected device. The attacker can then steal authentication credentials, cause denial-of-service conditions, and launch further attacks. Successful exploits allow persistent storage of script code in the affected device.
eTicket is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
The Conti FTP Server is prone to a denial-of-service vulnerability. A remote attacker may be able to exploit this issue to deny service to legitimate users of the application.
The GD graphics library is prone to multiple vulnerabilities. An attacker can exploit this issue to cause denial-of-service conditions or execute arbitrary code in the context of applications implementing the affected library.
Papoo is prone to an authentication-bypass vulnerability because the application fails to check user privileges when accessing the administration pages. An attacker can exploit this issue to gain access to administration plugins. This may lead to other attacks.
The Calendarix application is prone to multiple SQL-injection vulnerabilities. These vulnerabilities occur because the application fails to sufficiently sanitize user-supplied data before using it in SQL queries. An attacker can exploit these vulnerabilities to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.