This exploit allows for remote code execution on fully patched Windows Vista systems. It has been tested on Windows Vista Enterprise Version 6.0 (Build 6000) and Windows Vista Ultimate Version 6.0 (Build 6000) with default installation and UAC enabled. It may also work on other nt based Windows systems, but this has not been tested.
Featurific For WordPress plugin for WordPress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
The ClickDesk Live Support plugin for WordPress is vulnerable to a cross-site scripting (XSS) attack. This vulnerability occurs due to a lack of proper input sanitization, allowing an attacker to inject and execute arbitrary script code in the browser of a victim user. By exploiting this vulnerability, an attacker can potentially steal authentication credentials and launch further attacks.
Dolibarr is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Dolibarr is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Dolibarr is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This exploit allows an attacker to perform a blind SQL injection attack on the XOOPS Module RM+Soft Gallery 1.0 through the categos.php file. The vulnerability allows the attacker to retrieve sensitive information from the database.
The TA.CMS application is vulnerable to multiple local file-include and SQL-injection vulnerabilities. An attacker can exploit these issues to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and view and execute arbitrary local files within the context of the webserver.
The TA.CMS application is vulnerable to multiple local file inclusion and SQL injection vulnerabilities. An attacker can exploit these vulnerabilities to compromise the application, gain unauthorized access to or modify data, exploit other vulnerabilities in the database, and view and execute arbitrary local files within the context of the webserver.
The Adminimize plugin for WordPress is prone to a cross-site scripting vulnerability. This vulnerability occurs due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, within the context of the affected site. This can lead to the theft of cookie-based authentication credentials and the execution of other attacks.