CoolPHP is affected by multiple remote input validation vulnerabilities. These issues allow attackers to steal authentication credentials and execute arbitrary server-side scripts through cross-site scripting and file include attacks.
The Yak! Chat Client FTP server is prone to a remote directory traversal vulnerability. The issue occurs due to insufficient sanitization of user-supplied data. An attacker can exploit this vulnerability to compromise a computer by placing malicious files on the system and executing them through other means.
Pinnacle Systems ShowCenter is affected by a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied URI input. This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user.
A local attacker may exploit this vulnerability to create a listening port to provide remote access to a vulnerable computer.
The vulnerabilities in 3Com 3CRADSL72 allow remote attackers to disclose sensitive information and bypass authentication. This can lead to the disclosure of router name, primary and secondary DNS servers, default gateway, and even gaining administrative access to the router. These vulnerabilities can be exploited to launch further attacks against the device and other users on the vulnerable network.
The first issue is due to insufficient sanitization of user-supplied data, which allows an attacker to construct a malicious link containing HTML or script code. The second issue occurs when malicious code is sent to the 'tombstone.cfm' script through a URI parameter.
A denial of service vulnerability has been reported in IBM DB2. This vulnerability is reported to only exist when DB2 is installed on Microsoft Windows operating systems. This issue is due to a failure of the application to properly ensure that only authorized users can signal the DB2 UDB instance to shutdown. This is due to a Windows permissions issue related to shared memory sections, culminating in various denial of service attacks. This vulnerability allows attackers with local access to shutdown the DB2 UDB instance. This will result in the denial of database service to legitimate users.
An information disclosure vulnerability has been reported in IBM DB2. This vulnerability only exists when DB2 is installed on Microsoft Windows operating systems. This is due to a Windows permissions issue related to shared memory sections, culminating in authorized access to sensitive information. This vulnerability allows local users to inappropriately connect to DB2 IPC resources, and to also read files that may contain potentially sensitive information. This may aid them in further attacks.
IBM DB2 is prone to a denial of service vulnerability when DTS to string conversion is carried out. During a DTS to string conversion, a trap occurs if an empty formatting string is provided. The vulnerability is exposed in the 'to_char' and 'to_date' conversion functions.
The Campus Pipeline application fails to properly sanitize user-supplied URI input, allowing a remote attacker to create a malicious URI link that includes hostile HTML and script code. When a victim user follows this link, the hostile code may be executed in the security context of the affected web site, potentially leading to theft of cookie-based authentication credentials or other attacks.