eFront is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to obtain potentially sensitive information or to execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
The openQRM application fails to properly sanitize user-supplied data, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a victim user, potentially stealing their authentication credentials and launching further attacks.
DocMGR is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
The allocPSA application fails to properly sanitize user-supplied data, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a victim user, potentially allowing them to steal authentication credentials and launch further attacks.
Remote attackers can exploit this issue to cause a system-wide denial-of-service.
The 'com_docman' component for Mambo is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This exploit targets the D-Link DSL-2730B modem and specifically the lancfg2get.cgi script. It allows for the injection of stored XSS payloads, which can then be executed in the browser of internal network users. The exploit disables some features of the modem, requiring the administrator to reconfigure the device. Use with caution.
The exploit targets Frontbase version 4.2.7 for Windows. It exploits a vulnerability that allows SEH and EIP overwrite. The server only allows alphanumeric bytes, making exploitation more difficult. However, the exploit sends 3115 bytes to the server along with an address to overwrite SEH. The exploit was tested on Windows 2000 SP4 (not patched) with Frontbase version 4.2.7.
This exploit allows an attacker to inject malicious code into the wlsecrefresh.wl file of the D-Link DSL-2730B modem. The injected code will be executed in the browser of internal network users, forcing the administrator of the device to reconfigure the modem. Use with caution and at your own risk.
The 'com_cbcontact' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.