The file command is affected by a buffer overflow vulnerability. This issue is due to a failure of the application to properly validate string lengths in the affected file prior to copying them into static process buffers. An attacker may leverage this issue to execute arbitrary code with the privileges of a user that processes the malicious file with the affected utility. This may be leveraged to escalate privileges or to gain unauthorized access.
phpCMS is susceptible to a cross-site scripting vulnerability. This issue occurs when the application fails to properly sanitize user-supplied input before including it in dynamically generated web pages. An attacker can create a malicious URI link with hostile HTML and script code, which, if followed, can render the code in the victim user's web browser. This can lead to theft of cookie-based authentication credentials or other attacks.
The vulnerability occurs when the browser performs an infinite JavaScript array sort operation, leading to a denial of service. It is currently believed that this vulnerability cannot be further exploited to execute arbitrary code, although this has not been confirmed.
The vulnerability in Apple Safari Web Browser can be exploited by performing an infinite JavaScript array sort operation, leading to a browser crash. It is believed that this vulnerability only causes a denial of service and is not capable of executing arbitrary code, although this has not been confirmed.
InMail and InShop are susceptible to cross-site scripting vulnerabilities. These vulnerabilities occur due to a failure to properly sanitize user-supplied input before including it in dynamic web pages. An attacker can exploit these vulnerabilities by creating a malicious URI link that contains hostile HTML and script code. If a victim user follows this link, the hostile code may be rendered in their web browser, potentially allowing for theft of cookie-based authentication credentials or other attacks.
Java provides support for dynamic and static versioning when loading applets in the Java plug-in. This means that during the invocation of an applet, a user can request that a particular version of a plug-in be used to run the applet. The feature is accessible through various HTML tags that allow Java applets to be embedded in HTML documents, such as the EMBED, OBJECT, and APPLET tags. This feature presents a security weakness in that it may be abused to cause a previous version of a plug-in that is known to be prone to security vulnerabilities to be loaded in lieu of a more recent, fixed version. For this design flaw to pose a security threat, a vulnerable plug-in must either already be installed on the host computer or the user must manually install a version that is prone to security vulnerabilities. If a targeted version is not installed, the user may be prompted to install it. This weakness could result in a false sense of security, since the user may believe that installing an updated version will eliminate vulnerabilities in previous versions. Note that since this feature is supported in various browsers, the browsers themselves may be prone to the issue. Some browsers may not allow a Java plug-in that is no longer registered with the browser to run.
A handcrafted 'a.out' file can trigger a local denial-of-service condition, potentially resulting in a kernel panic. A memory-disclosure vulnerability affects only SMP computers with more than 4GB of memory, allowing a local attacker to access random pages of physical memory. Executing a specially crafted file results in a kernel oops and consuming file descriptors and memory.
This vulnerability in Microsoft Internet browser allows an attacker to crash the browser by performing an infinite JavaScript array sort operation. It is speculated that this vulnerability only leads to a denial of service and cannot be further exploited to execute arbitrary code, although this has not been confirmed.
A remote buffer overflow vulnerability affects the Open DC Hub. This issue is due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into finite process buffers. An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.
JSPWiki is susceptible to a cross-site scripting vulnerability. This issue allows a remote attacker to create a malicious URI link that includes hostile HTML and script code. If the link is followed, the hostile code may be rendered in the web browser of the victim user, potentially leading to theft of authentication credentials or other attacks.