epesi BIM is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
The Cyberoam UTM is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Joomla! 'com_caproductprices' component is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHPShop CMS is prone to multiple cross-site scripting and SQL-injection vulnerabilities. These vulnerabilities occur due to the failure of the application to properly sanitize user-supplied input before using it in dynamically generated content. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The application fails to properly sanitize user-supplied input, allowing attacker-supplied HTML and script code to run in the context of the affected browser. This can lead to the theft of cookie-based authentication credentials or control over how the site is rendered to the user.
This exploit is a local buffer overflow in the .ANI file format on Microsoft Windows. It launches calc.exe on various applications such as Word and Winamp. DEP (Data Execution Prevention) needs to be turned off for it to work on Explorer. It was tested against Windows XP SP2 FR.
The Joomla! 'com_tsonymf' component is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The PHP Booking Calendar is vulnerable to a cross-site scripting (XSS) vulnerability due to inadequate user-supplied data sanitization. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user within the context of the affected site. This can lead to the theft of cookie-based authentication credentials and enable further attacks.
The WP Marketplace plugin before 2.4.1 for WordPress allows remote attackers to read arbitrary files via a full pathname in the wpmp_pp_ajax_call parameter to wp-admin/admin-ajax.php
Video Community Portal is vulnerable to an SQL injection attack due to insufficient sanitization of user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to compromise the application, access or modify data, or exploit other vulnerabilities in the underlying database.