When a passive session is initiated in a specific manner, SafeTP may return the address of a system serving files that is behind at NAT firewall.
Jetty does not properly sanitize requests, which could result in a user clicking a malicious link that would execute script or HTML code in the security context of the site hosted by the Jetty server. An attacker could exploit this vulnerability to gain authentication cookies, or other sensitive information.
A remote command execution vulnerability has been reported for vBulletin. The vulnerability is due to vBulletin failing to properly sanitize user-supplied input from URI parameters. An attacker can exploit this vulnerability to execute malicious commands on the vulnerable system by crafting a malicious URL.
It has been reported that an insecure sscanf() function exists in gv. Due to this function, an attacker may be able to put malicious code in the %%PageOrder: portion of a file. When this malicious file is opened with gv, the code would be executed in the security context of the user opening the file.
A vulnerability has been reported for Zope 2.5.1 and earlier. Reportedly, Zope does not handle XML-RPC requests properly. Specially crafted XML-RPC requests may cause Zope to respond to a request with an error page with system specific details.
The vulnerable code snippet does not stop post requests to the absolute_path variable, allowing an attacker to inject malicious code into the application. An attacker can use a r57shell with a twist to exploit this vulnerability.
phpWebSite does not sufficiently filter potentially malicious HTML code from news posts, allowing an attacker to inject malicious JavaScript code into a news post. When a user views the post, the code is executed in the browser of the vulnerable user.
Drupal fails to sufficiently filter potentially malicious HTML code from news posts, allowing an attacker to execute arbitrary script code in a vulnerable client. This can be done by inserting malicious HTML code, such as an IMG tag with a JavaScript alert, into a news post.
Due to insufficient sanitization of variables used in SQL queries, it is possible to modify the logic of SQL queries. This issue could result in a denial of service attack or the corruption of database information.
DaCode is vulnerable to HTML injection attacks due to insufficient filtering of potentially malicious HTML code from news posts. When a user views a news posting that contains malicious HTML code, the code contained in the posted message would be executed in the browser of the vulnerable user.