The application Sisfo Kampus is vulnerable to an arbitrary-file-download vulnerability. This vulnerability occurs due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to download arbitrary files within the context of the webserver process, potentially leading to further attacks.
phpMyQuote is prone to multiple input-validation vulnerabilities, including a cross-site scripting issue and an SQL-injection issue, because the application fails to sanitize user-supplied input. A successful exploit may allow an attacker to steal cookie-based authentication credentials, execute malicious script code in a user's browser, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Proxy Anket is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Pulsewiki and Pawfaliki are prone to a local file-include vulnerability because the software fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an unauthorized user to view files and execute local scripts.
The Microsoft Agent (agentsvr.exe) application is vulnerable to a stack-based buffer overflow. This vulnerability occurs due to the application's failure to properly validate user-supplied data, allowing remote attackers to execute arbitrary code in the context of the logged-in user. Failed exploit attempts may result in denial-of-service conditions.
The vulnerabilities in Alien Arena 2007 allow an attacker to execute arbitrary code within the application or disconnect users from the game server.
The vulnerability is caused by a heap-based buffer overflow in AkkyWareHOUSE 7-zip32.dll due to improper bounds checking of user-supplied input. Attackers can exploit this vulnerability to execute arbitrary machine code in the context of the affected application, leading to potential denial-of-service conditions.
The E-Smart Cart application is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. A proof of concept is available where the attacker can use the username 'or''=' and password 'or''=' to exploit the vulnerability.
Apache Tomcat is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
The 212cafe Webboard is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.