The Microsoft Windows implementation of Kerberos is prone to a security-bypass vulnerability. Successful exploits may allow attackers to gain unauthorized access to affected computers through replay attacks.
The Sonique application is prone to a remote stack-based buffer-overflow vulnerability. This vulnerability occurs due to the application's failure to perform adequate boundary checks on user-supplied input. Attackers can leverage this issue to execute arbitrary code in the context of the application, potentially leading to denial-of-service conditions in failed attacks.
JBoard is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sanitize user-supplied input. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Rock Band CMS is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This exploit allows an attacker to perform remote command execution by poisoning the $_SESSION variable in XRMS. The vulnerability is due to a lack of proper input validation in the username parameter. By injecting SQL statements, an attacker can execute arbitrary commands on the server.
JForum is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
The Computer Associates Oneview Monitor application fails to properly sanitize user-supplied input, leading to a remote code execution vulnerability. An attacker can inject and execute arbitrary JSP code in the context of the affected webserver by exploiting this issue.
The ServletExec application is vulnerable to a directory traversal vulnerability and multiple authentication bypass vulnerabilities. These vulnerabilities occur due to insufficient sanitization of user-supplied input. An attacker can exploit these vulnerabilities to gain administrative access to the affected application and retrieve sensitive information for further attacks.
TagCloud fails to properly sanitize user-supplied input before using it in dynamically generated content, allowing attacker-supplied HTML and script code to run in the context of the affected browser.
The Portable Document Format (PDF) specification is prone to a signature-collision attack when signing PDF documents. An attacker can exploit this issue to create PDF documents containing forged signatures. Successfully exploiting this issue will result in the application accepting the signature of a document as valid when it is not. This may result in a false sense of security; other attacks are also possible.