The Accept Signups Plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
The Joomla! Classified component is prone to an SQL-injection vulnerability. This vulnerability occurs because the component fails to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries, which may allow them to bypass the authentication mechanism and gain unauthorized access to the application or the underlying database. This could lead to the compromise of sensitive information, data modification, or the exploitation of other latent vulnerabilities in the database.
ImpressCMS is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
The Mediatricks Viva Thumbs plugin for WordPress is prone to multiple information-disclosure vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues using directory-traversal strings to confirm the existence of local files outside of the WordPress webroot. Information obtained can aid in launching further attacks.
Mitel Audio and Web Conferencing (AWC) is prone to a remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data. Remote attackers can exploit this issue to execute arbitrary shell commands with the privileges of the user running the application.
The Calibre software is prone to a cross-site scripting vulnerability and a directory-traversal vulnerability due to insufficient sanitization of user-supplied input. Exploiting these vulnerabilities allows an attacker to execute arbitrary script code in the browser of an unsuspecting user and view arbitrary local files and directories within the context of the webserver. This can lead to the theft of authentication credentials and other sensitive information, which can be used to launch further attacks.
This exploit allows an attacker to execute SQL injection attacks on the Katalog Plyt Audio script version 1.0. The vulnerability exists due to improper input validation, which allows an attacker to manipulate SQL queries and gain unauthorized access to the database.
Habari is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Openfiler is vulnerable to a cross-site scripting (XSS) attack due to inadequate input sanitization. An attacker can exploit this vulnerability by injecting arbitrary script code through user-supplied data. This can lead to the execution of malicious scripts in the browser of a targeted user, potentially allowing the attacker to steal authentication credentials and carry out further attacks.
FreeNAS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.