Attackers can exploit this issue to cause the application to crash, denying service to legitimate users.
The Open Handset Alliance Android is prone to a vulnerability that may allow a bypass of the browser sandbox. Successful exploits will allow attackers to execute arbitrary script code within the context of an arbitrary domain.
The MyTabs plugin for MyBB is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
Skype is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
Curverider Elgg is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Sitecore CMS is prone to a URI-redirection vulnerability because the application fails to properly sanitize user-supplied input. Successful exploits may redirect a user to a potentially malicious site; this may aid in phishing attacks.
The HP Network Automation application is prone to an SQL injection vulnerability due to the lack of proper sanitization of user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
The vulnerability exists due to an invalid include function at lib/timesheet.class.php. An attacker can exploit this vulnerability by manipulating the 'inc_dir' parameter to include a remote file, which could lead to system access.
This is an exploit for the Apache ap_get_mime_headers_core() vulnerability. The vulnerability allows an attacker to cause a Denial of Service (D.o.S) attack by sending a specially crafted HTTP request to the target server. The exploit sends a large number of GET requests with a long content-length header, causing the server to run out of memory and potentially crash. This exploit is specific to Apache version 2 prior to version 2.0.49.
This exploit allows an attacker to spawn a shell on port 32768 by exploiting a vulnerability in Microsoft IIS WebDAV.