1) Apache Geronimo Application Server Multiple Remote Vulnerabilities
Apache Geronimo Application Server is susceptible to multiple vulnerabilities including Cross-Site Scripting, HTML Injection, directory traversal, and Cross-Site Request Forgery. Successful exploitation could give an attacker the means to access sensitive information, steal cookie-based authentication credentials, and perform actions as an authenticated user. An update which addresses these vulnerabilities has been released. Contact the vendor for more information.
2) SAP cFolders Cross-Site Scripting and HTML Injection Vulnerabilities
SAP cFolders is susceptible to Cross-Site Scripting and HTML Injection vulnerabilities. Successful exploitation could give an attacker the means to steal cookie-based authentication credentials, execute arbitrary code in context of the site, or simply alter how the site appears. Updates which resolve these issues are available. Contact the vendor for more details.
3) CS Whois Lookup 'ip' Parameter Remote Command Execution Vulnerability
CS Whois Lookup is susceptible to a remote command execution vulnerability. Remote attackers can exploit this vulnerability to execute arbitrary commands with the privileges of the affected application, possibly leading to its compromise as well as that of the underlying web server. A fix has not yet been released. Contact the vendor for additional information.
4) phpMyAdmin Configuration File PHP Code Injection Vulnerability
phpMyAdmin is susceptible to a remote PHP code-injection vulnerability. An attacker can leverage this vulnerability to inject and execute arbitrary malicious PHP code in the context of the webserver process, which could lead to a compromise of the application and underlying system. Updates which resolve this issue are available. Contact the vendor for more information.
5) Novell Teaming User Enumeration Weakness and Multiple Cross-Site Scripting Vulnerabilities
Novell Teaming is susceptible to multiple Cross-Site Scripting vulnerabilities and a user enumeration weakness. These vulnerabilities can be exploited to discover the names of legitimate users, execute code in the browser of an unsuspecting user, and steal cookie-based authentication credentials. Advisories with patch instructions have been issued. Contact the vendor for further details.