This exploit allows an attacker to perform remote command execution by poisoning the $_SESSION variable in XRMS. The vulnerability is due to a lack of proper input validation in the username parameter. By injecting SQL statements, an attacker can execute arbitrary commands on the server.
JForum is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
The Computer Associates Oneview Monitor application fails to properly sanitize user-supplied input, leading to a remote code execution vulnerability. An attacker can inject and execute arbitrary JSP code in the context of the affected webserver by exploiting this issue.
The ServletExec application is vulnerable to a directory traversal vulnerability and multiple authentication bypass vulnerabilities. These vulnerabilities occur due to insufficient sanitization of user-supplied input. An attacker can exploit these vulnerabilities to gain administrative access to the affected application and retrieve sensitive information for further attacks.
TagCloud fails to properly sanitize user-supplied input before using it in dynamically generated content, allowing attacker-supplied HTML and script code to run in the context of the affected browser.
The Portable Document Format (PDF) specification is prone to a signature-collision attack when signing PDF documents. An attacker can exploit this issue to create PDF documents containing forged signatures. Successfully exploiting this issue will result in the application accepting the signature of a document as valid when it is not. This may result in a false sense of security; other attacks are also possible.
Simple Directory Listing is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
Nagios XI is prone to multiple cross-site request-forgery vulnerabilities because the application fails to properly validate HTTP requests. Successful exploit requires that the 'nagiosadmin' be logged into the web interface. Attackers can exploit these issues to gain unauthorized access to the affected application and perform certain administrative actions.
The Preation Eden Platform is prone to multiple HTML-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
The PMB Services application version 3.0.13 and below is vulnerable to multiple remote file inclusion attacks. An attacker can exploit this vulnerability to include arbitrary remote files, potentially leading to remote code execution or unauthorized access to sensitive information.