KDE's Konqueror web browser is vulnerable to a buffer overflow when processing HTML documents with overly long color attributes. This can be exploited to cause a denial of service or potentially execute arbitrary code.
WebBiscuits Modules Controller version 1.1 is vulnerable to Remote File Inclusion and Remote File Disclosure. An attacker can exploit this vulnerability to include arbitrary files from remote locations and disclose sensitive information from the server.
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'idcat' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the administrative panel or to steal sensitive information from the database.
DFF PHP Framework API (Data Feed File) is vulnerable to multiple inclusion vulnerabilities. An attacker can exploit these vulnerabilities by sending a crafted request to the vulnerable script with the DFF_config[dir_include] parameter set to a malicious file. This can allow the attacker to execute arbitrary code on the vulnerable system.
This control allows to build highly customized POST requests against private upload facilities, using the browser as a proxy to bounce them and by injecting a filename sub-field through ex. the AddString() method.
A Blind SQL Injection vulnerability exists in TorrentTrader Classic version 1.04. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'completed-advance.php' script. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable script. This can allow the attacker to gain access to sensitive information stored in the database.
A vulnerability exists in Built2Go PHP RealEstate v1.5, which allows an attacker to inject arbitrary SQL commands via the 'event_id' parameter in 'event_detail.php'. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as usernames and passwords.
Yourownbux v4.0 is vulnerable to Blind SQL Injection. An attacker can inject malicious SQL queries via the 'usNick' cookie parameter in the 'referrals.php' page. An attacker can use this vulnerability to extract sensitive information from the database such as user passwords.
A vulnerability exists in Joomla Component com_hotspots (w) which allows an attacker to inject malicious SQL queries via the 'w' parameter in a 'index.php' script. This can be exploited to disclose sensitive information from the database.
Yerba SACphp <= 6.3 is vulnerable to multiple remote vulnerabilities. An attacker can bypass the admin login, escalate privileges, download arbitrary databases and add arbitrary admins.