The Joomla! RSS Feed Reader is vulnerable to a remote file-include vulnerability. This occurs due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by injecting malicious code into the 'mosConfig_live_site' parameter of the 'admin.wmtrssreader.php' file. Successful exploitation could allow the attacker to compromise the application and the underlying system, potentially leading to further attacks.
Linksys SPA941 devices are prone to an HTML-injection vulnerability because the built-in webserver fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
This vulnerability allows an attacker to disclose passwords from the passwd.txt file in WWWBoard 2.0 Alpha 2. The exploit can be accessed through the URL http://[target]/[www_board_path]/passwd.txt.
DNews is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
AlsaPlayer is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer. Exploiting this issue allows attackers to execute arbitrary machine code in the context of users running the affected application.
SNewsCMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
The Nagios Plugins software is vulnerable to a remote buffer-overflow vulnerability. Attackers can exploit this vulnerability to execute arbitrary machine code in the context of the affected users. The vulnerability exists due to the software's failure to properly bounds-check user-supplied data before copying it to a buffer that is not large enough.
The vulnerability allows remote attackers to execute arbitrary commands in the context of users that follow malicious URIs. Attack vectors include following URIs in Mozilla Firefox, Skype, Adobe Acrobat Reader, Miranda, Netscape, and mIRC. The issue in BID 25543 (Mozilla Firefox 2.0.0.6 Unspecified Protocol Handling Command Injection Vulnerability) can also be exploited as an attack vector for this issue.
The Dawn of Time MUD server is prone to multiple format-string vulnerabilities. Exploiting these issues will allow attackers to execute arbitrary code with the permissions of a user running the application. Failed attacks will likely cause denial-of-service conditions.
The vulnerabilities in DropTeam allow an attacker to execute arbitrary code, crash the application, and obtain sensitive information. These vulnerabilities can be exploited remotely.