The Live for Speed application is vulnerable to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the vulnerable application. Successful exploitation of this vulnerability can lead to remote attackers compromising affected computers. Failed exploit attempts may cause denial-of-service conditions.
Bind a remote cmd.exe on target host on 4444 port. This exploit is based on the original exploit discovered by Greg Linares. The shellcode used in this exploit is encoded using Skylined alpha2 tool. Credits to hdm and vlads902 for the original shellcode.
The Scott Manktelow Design Stride 1.0 Merchant application is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Linkliste is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
The Scott Manktelow Design Stride 1.0 Content Management System is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
An attacker can exploit this issue to gain administrative access to the vulnerable application. This may lead to other attacks.
The Stride 1.0 Courses application is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The vulnerability allows an attacker to remotely download the newsCMS.mdb database file, which contains sensitive information such as passwords.
Nucleus CMS is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
CRS Manager is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.