Is this is a vulnerability in the scripts?
/home/z/z91510v7/aid-medialibrary.ru/public_html/libraries/vendor/phpmailer/phpmailer/class.phpmailer.php - RCE : CVE-2016-10045, CVE-2016-10031
Are those are real JS virus threats?
medialibrary.ru/public_html/administrator/components/com_virtuemart/views/media/tmpl/edit.php
[x] 1…::imitateTabs('start','COM_VIRTUEMART_PRODUCT_MEDIA'
;echo'<form name="adminForm" id="adminForm" method="post" enctype=" multipart/form-data">';echo '<fieldset>';$this->media->addHidden('view','media'
;$this->media->addHidden('task',''
;$th
23/08/2018 16:51:23
1.62 Kb
/home/z/z91510v7/aid-medialibrary.ru/public_html/administrator/components/com_virtuemart/views/user/tmpl/edit.php
[x] 1…ckground-color:#fff;color:#f00;}</style><form method="post" id="adminForm" name="adminForm" action="index.php" enctype=" multipart/form-data" class="form-validate" onSubmit="return myValidator(this);"><?php $tabarray=array();if(!empty($this-
23/08/2018 16:51:23
1.96 Kb
/home/z/z91510v7/aid-medialibrary.ru/public_html/administrator/components/com_virtuemart/views/category/tmpl/edit.php
[x] 1…($this);$editor=JFactory::getEditor();?><form action="index.php" method="post" id="adminForm" name="adminForm" enctype=" multipart/form-data"><?php AdminUIHelper::buildTabs($this,array('categoryform'=>'COM_VIRTUEMART_CATEGORY_FORM_LBL','cat
23/08/2018 16:51:23
1.41 Kb
/home/z/z91510v7/aid-medialibrary.ru/public_html/components/com_medialibrary/tcpdf/include/tcpdf_static.php
[x] 1…oft Windows: [Alt +00AD] or [Alt 0173]</li> *<li>UTF-8(hex): 0xC2 0xAD(c2ad)</li> *<li>UTF-8 character: chr(194).'�'</li> *</ul> * param$txt(string) input string * param$unicode(boolean) True i
10/04/2017 13:38:06
123.27 Kb
/home/z/z91510v7/aid-medialibrary.ru/public_html/administrator/components/com_medialibrary/medialibrary.php
[x] 1…->store();$book->checkin();}mosRedirect("index.php?option=$option"
;}function import($option){global$database,$my;$file= file($_FILES['import_file']['tmp_name']);$catid=mosGetParam($_POST,'import_catid'
;$type=mosGetParam($_POST,'import_typ
10/04/2017 13:38:06
351.51 Kb
/home/z/z91510v7/aid-medialibrary.ru/public_html/administrator/components/com_osgallery/helpers/osGalleryHelperAdmin.php
[x] 1… Exception('Getting content length is not supported.'
;}}}static function fileSave($dest,$post_form){if($post_form){if(! move_uploaded_file($_FILES['qqfile']['tmp_name'],$dest)){return false;}return true;}else{$input=fopen("php://input","r"
09/02/2017 09:32:46
59.80 Kb
/home/z/z91510v7/aid-medialibrary.ru/public_html/components/com_medialibrary/tcpdf/tcpdf_parser.php
[x] 1…o[s]+([0-9]+)[s]+([0-9]+)[s]+R/i',$trailer_data,$matches)>0){$xref['trailer']['info']=intval($matches[1]).'_'.intval( $matches[2]);}if(preg_match('/ID[s]*[][s]*[<]([^>]*)[>][s]*[<]([^>]*)[>]/i',$trailer_data,$matches)>0){$xref['trai
10/04/2017 13:38:06
31.97 Kb
/home/z/z91510v7/aid-medialibrary.ru/public_html/plugins/system/less/lessc/less.php/Less.php
[x] 1…e_string=' new '.$class.'('.Less_Parser::ArgString($arg).'
';}return$obj;}public function NewObj2($class,$args){$obj=new $class($args[0],$args[1]);if($this->CacheEnabled()){$this->ObjCache($obj,$class,$args);}return$obj;}public function New
31/03/2016 13:07:42
241.97 Kb
Are those are real Javascript threats?
/home/z/z91510v7/aid-medialibrary.ru/public_html/components/com_osgallery/assets/libraries/bootstrap/bootstrapGall.js
[x] 1…ext==null)$el.data('resetText',$el[val]()) // push to event loop to allow forms to submit setTimeout($.proxy(function(){ $el[val](data[state]==null?this.options[state] : data[state]) if(state=='loadingText'
{this.isLoading=true$el.addClass(
09/02/2017 09:32:46
67.40 Kb
/home/z/z91510v7/aid-medialibrary.ru/public_html/templates/classic_medialibrary_v2/bootstrap/js/bootstrap.js
[x] 1…ext==null)$el.data('resetText',$el[val]()) // push to event loop to allow forms to submit setTimeout($.proxy(function(){ $el[val](data[state]==null?this.options[state] : data[state]) if(state=='loadingText'
{this.isLoading=true$el.addClass(
24/02/2017 10:49:50
68.11 Kb