An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.
An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.
CollabNet Subversion Edge is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would run in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
The @Mail application fails to properly sanitize user-supplied data, allowing an attacker to execute arbitrary JavaScript code in the browser of a targeted user. This can lead to the theft of sensitive information such as authentication credentials and enable further attacks.
The X-ice News System v1.0 is vulnerable to a remote SQL injection attack. An attacker can inject malicious SQL code into the username and password fields in the login page to retrieve sensitive information from the database, such as usernames and passwords.
Pinky is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue will allow an attacker to read files outside the webroot directory. Information harvested may aid in launching further attacks.
The Basic Web Server is vulnerable to a directory-traversal vulnerability and a denial-of-service vulnerability. Exploiting these issues allows attackers to obtain sensitive information or cause denial-of-service conditions.
The Spain component for Joomla is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This module exploits an authentication bypass vulnerability in Solarwinds Storage Manager. The vulnerability exists in the AuthenticationFilter, which allows to bypass authentication with specially crafted URLs. After bypassing authentication, is possible to use a file upload function to achieve remote code execution. This module has been tested successfully in Solarwinds Store Manager Server 5.1.0 and 5.7.1 on Windows 32 bits, Windows 64 bits and Linux 64 bits operating systems.
The GestArt portal is vulnerable to Remote File Inclusion. The 'aide.php' script includes a file based on user input without proper validation, allowing an attacker to include arbitrary files from a remote server. This can lead to remote code execution and compromise the target system.