The Smart Statistics application is vulnerable to a cross-site scripting (XSS) vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the context of an unsuspecting user's browser on the affected site. This can lead to the theft of authentication credentials and enable the attacker to launch further attacks.
A remote command execution is triggered when craft command is sent to the Hp Data Protector Manager to tcp port 5555.
This module exploits an anonymous remote code execution vulnerability on different D-Link devices. The vulnerability is due to a stack-based buffer overflow while handling malicious HTTP POST requests addressed to the HNAP handler. This module has been successfully tested on D-Link DIR-505 in an emulated environment.
Shopizer is prone to remote command execution vulnerability due to using Apache Struts 2.2.1.1 and also affected by manipulation of product prices and manipulation of customer data/mass.
This exploit takes advantage of a vulnerability in the News-Letterman 1.1 software, specifically in the 'eintrag.php' file. The vulnerable code includes a user-supplied input file, which can be exploited to include remote files from an attacker-controlled server. This can lead to remote code execution and potential compromise of the target system.
The 'CALL SP_DEL_BAK_EXPIRED' function in DM Database Server is vulnerable to remote memory corruption when a large string is passed to the first argument. An attacker can exploit this vulnerability to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
The wsCMS application fails to properly sanitize user-supplied input before using it in dynamically generated content. This allows an attacker to execute arbitrary script code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other attacks.
The CMScout application fails to properly sanitize user-supplied data, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other malicious activities.
GR Board is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.