The vulnerabilities in Mambo Open Source are caused by a lack of proper input validation for user-supplied URI parameters. This allows an attacker to execute arbitrary server-side script code, perform cross-site scripting attacks, and carry out SQL injection attacks against the affected application.
The ReMOSitory module for Mambo is prone to an SQL injection vulnerability. This vulnerability allows a malicious user to influence database queries and potentially view or modify sensitive information. In this case, it is possible for an attacker to disclose the administrator password hash.
A remote attacker can create a malicious link containing arbitrary HTML and JavaScript code as URI parameters in the YaBB.pl script. When an unsuspecting user visits the link, the attacker's code will be executed in their browser in the context of the vulnerable website.
YaBB is affected by an administrator command execution vulnerability. This issue allows a remote attacker to create a malicious URI link or embed a malicious URI between IMG tags, which includes hostile YaBB administrative commands. If an unsuspecting forum administrator views a post that contains this IMG tag, they will inadvertently activate the malicious URI, and the attacker-supplied command is carried out with the administrator's privileges.
DNS4Me is susceptible to a denial of service vulnerability where attackers can cause the web server to consume all available CPU resources and crash the application. Additionally, there is a cross-site scripting vulnerability due to the application's failure to properly sanitize user-supplied URI input. This allows remote attackers to create malicious URI links containing hostile HTML and script code, which can be rendered in the victim's web browser, potentially leading to theft of authentication credentials or other attacks.
RsyncX is reported to contain an insecure temporary file creation vulnerability. The result of this is that temporary files created by the application may use predictable filenames. A local attacker may exploit this vulnerability to execute symbolic link file overwrite attacks.
RsyncX is installed setuid root and setgid wheel. It fails to drop setgid wheel privileges before executing a third party binary, allowing a local attacker to execute arbitrary code with group wheel privileges.
The Google Toolbar 'ABOUT.HTML' page allows the injection of HTML and JavaScript code, which may allow an attacker to inject malicious code into the about page of the vulnerable application.
Sudo is prone to an information disclosure vulnerability. This vulnerability presents itself when sudo is called with the '-e' option, or the 'sudoedit' command is invoked. In certain circumstances, attackers may access the contents of arbitrary files with superuser privileges.
A remote attacker can exploit a vulnerability in Explorer.exe on Microsoft Windows XP prior to Windows XP SP2 by presenting a malicious TIFF image to a victim user. When the image is processed, it consumes system resources and impacts the performance of the computer, resulting in a denial of service.