The vulnerability allows attackers to execute arbitrary script code in the browser of an unsuspecting user by injecting malicious input. This can lead to the theft of authentication credentials and other attacks.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. An attacker can leverage these issues to execute SQL statements in the context of an affected user as well.
Utopia News Pro is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. These may facilitate the theft of cookie-based authentication credentials as well as other attacks.
A remote denial of service vulnerability exists in Mozilla Firefox. The vulnerability occurs when the browser handles a specially crafted IFRAME. An attacker can exploit this vulnerability to crash the application or consume excessive CPU and memory resources on affected computers.
The 'gnome-pty-helper' application is susceptible to a local UTMP hostname spoofing vulnerability. This allows users to spoof remote hostname information in UTMP records, potentially misdirecting administrators and users.
This exploit includes multiple vulnerabilities in Monkey CMS. The vulnerabilities include local path disclosure, MySQL injection (error-based and time-based blind), and remote command execution.
An attacker can exploit this vulnerability to corrupt process memory, potentially leading to a crash or arbitrary code execution. Complete compromise of the affected system may be possible.
This is a remote exploit for Netscape Enterprise Server 4.0 on the sparc architecture running SunOS 5.7. The exploit allows an attacker to execute arbitrary commands on the target system. The attacker needs to provide a command line argument that will be executed on the target system. The exploit takes advantage of a vulnerability in the server to inject and execute the provided command. The command is encoded to replace bad characters. The exploit uses a shellcode to execute the command.
This vulnerability occurs when Internet Explorer for Mac OS attempts to render a web page with malformed content. An attacker can exploit this vulnerability to cause a denial of service condition on the affected system.
AEwebworks aeDating is prone to an SQL injection vulnerability. This is due to a lack of proper sanitization of user-supplied input before it is used in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.