Check Point Software Endpoint Security Full Disk Encryption for Microsoft Windows is prone to a remote denial-of-service vulnerability. Exploiting this issue will allow attackers to crash the affected computer, denying service to legitimate users. An example exploit is available: for /L %i in (1,1,20) do mstsc /v:127.0.0.%i
IBM Tivoli Identity Manager is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
DvBBS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
HP Operations Dashboard is prone to a remote security vulnerability. Attackers can exploit this issue using readily available tools. Successful exploits will allow attackers to gain unauthorized access to the affected application.
HP Operations Manager is prone to a remote security vulnerability. Attackers can exploit this issue using readily available tools. Successful exploits will allow attackers to gain unauthorized access to the affected application.
Adobe RoboHelp Server is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to upload and execute arbitrary code with SYSTEM-level privileges. An attacker can send a specially crafted POST request to the server, which will bypass authentication and allow the attacker to upload a JSP trojan. The attacker can then use the 'sessionid' value from the reply to execute the JSP trojan.
MKPortal is vulnerable to HTML-injection due to insufficient sanitization of user-supplied data. Attacker-supplied HTML or JavaScript code can be executed in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user. The example data provided shows that the application fails to properly validate user-supplied input, allowing attackers to inject malicious HTML or JavaScript code.
SmartVMD ActiveX control is prone to a buffer-overflow vulnerability because the application fails to adequately check boundaries on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.
Multiple modules of MKPortal are prone to cross-site scripting vulnerabilities because the software fails to sufficiently sanitize user-supplied data. Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials; other attacks are also possible.
Nokia Multimedia Player is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause the affected application to stop responding, denying service to legitimate users.