Orb Networks Orb is prone to a denial-of-service vulnerability when handling malformed '.mp3' files. Successfully exploiting this issue allows remote attackers to deny service to legitimate users.
An attacker can execute arbitrary code in the browser, steal authentication credentials, bypass security restrictions, or perform other attacks.
The CSS Web Installer ActiveX control in Authentium Command On Demand Online scanner is prone to multiple buffer-overflow vulnerabilities. An attacker can exploit these issues by enticing a victim to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.
Attackers are able to read arbitrary files by specifying a relative path.
This exploit allows an attacker to include a remote file in the vulnerable PHP script 'functions.php' in phpBB Extreme 3.0.1. The vulnerable parameter is 'phpbb_root_path'. By manipulating this parameter, an attacker can include a malicious file from a remote server, potentially leading to remote code execution.
This is a buffer overflow exploit in the iwsh.c file. It allows an attacker to execute arbitrary code on a vulnerable system. The exploit has been tested on R3000 Indigo (Irix 5.3) and R4400 Indy (Irix 5.3) systems. The vulnerability exists only in Irix 5.x systems. The exploit overflows a buffer and gains control of the program's execution flow, allowing the attacker to execute their own shellcode.
The application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can execute arbitrary script code in the browser of an unsuspecting user, potentially stealing authentication credentials and launching further attacks.
Buffer overflow exists in Subject parameter of the .nzb file. By passing more than 2022 bytes, we can able to overwrite SEH handler. The buffer consists of 2022 bytes of A's, followed by a short jmp to the hellcode, SEH handler, NOP sled, and shellcode.
Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.
The Sparta Systems TrackWise EQMS application is vulnerable to multiple cross-site scripting attacks. This is due to a lack of proper input sanitization, which allows attackers to inject and execute arbitrary script code in the browser of an unsuspecting user. By exploiting these vulnerabilities, an attacker can steal authentication credentials and launch further attacks.