The Sun Java Runtime Environment is prone to a remote privilege-escalation vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the user who invoked the Java applet. Successfully exploiting this issue may result in the remote compromise of affected computers.
The 'Systeme de vote pour site Web' application is prone to multiple remote file-include vulnerabilities due to insufficient sanitization of user-supplied input. Exploiting these issues may allow an attacker to compromise the application and the underlying system, and other attacks are also possible.
Babo Violent 2 is prone to a format-string issue and three denial-of-service issues. Successful attacks could allow attackers to execute arbitrary code or crash game servers.
Live For Speed is prone to four vulnerabilities, including buffer-overflow and denial-of-service issues. Successful exploits could allow attackers to execute arbitrary code or to crash game servers.
The Zoidcom network library is prone to a denial of service vulnerability when handling malformed packets. An attacker could exploit this to crash a network service that is implemented with the library.
Apache Tomcat is prone to multiple information-disclosure vulnerabilities because it fails to adequately sanitize user-supplied data. Attackers can exploit these issues to access potentially sensitive data that may aid in further attacks.
The Apache Tomcat Host Manager Servlet is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to inject HTML and script code into the browser of an unsuspecting victim. The attacker may then steal cookie-based authentication credentials and launch other attacks.
The vulnerability exists in Microsoft Internet Explorer when rendering VML graphics. Attackers can exploit this vulnerability to execute arbitrary code in the context of the logged-in user, leading to potential remote compromise or denial-of-service conditions.
The JobLister3 application is vulnerable to SQL injection attacks. This vulnerability occurs due to the application's failure to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by injecting malicious SQL statements into the 'jobid' parameter of the 'showbyID' mode. Successful exploitation could allow the attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
OWASP Stinger is prone to a filter-bypass weakness because the application fails to properly handle certain input. Since the OWASP Stinger project is a software module designed to be incorporated into other applications, this weakness may be exploitable only if applications use it in a vulnerable way. Successfully exploiting this issue may allow attackers to bypass the filter, aiding them in further attacks.