Comodo Firewall is prone to multiple denial-of-service vulnerabilities because it fails to adequately validate user supplied data. Exploiting these issues may permit attackers to cause system crashes and deny service to legitimate users. Presumaby, attackers may also be able to execute arbitrary code, but this has not been confirmed.
Sun Solaris is prone to a remote denial-of-service vulnerability. A successful attack can trigger a crash in the operating system, leading to a denial-of-service condition for legitimate users. Solaris 10 is affected by this issue.
Microsoft Word 2000 is prone to a remote code-execution vulnerability. Exploit attempts against Word 2003/XP will consume all CPU resources and will cause a denial of service for legitimate users.
The AVM Fritz!DSL IGD Control Service is prone to a remote information-disclosure vulnerability because the application fails to properly sanitize user-supplied input. Exploiting this issue allows remote, unauthenticated attackers to retrieve the contents of arbitrary files from vulnerable computers with SYSTEM-level privileges. Information harvested may aid in further attacks.
SmE File Mailer is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. The following input to the login form is sufficient to exploit this issue: Login: admin Password: anything' OR 'x'='x
Outpost Firewall PRO is prone to a local privilege-escalation vulnerability because it fails to perform adequate SSDT (System Service Descriptor Table) hooking on files in its installation directory. A local attacker can exploit this issue to elevate their privileges, which can lead to the complete compromise of an affected computer.
Grsecurity Kernel PaX is prone to a local privilege-escalation vulnerability. An attacker can exploit this issue to obtain superuser privileges. A successful attack can result in the complete compromise of the affected computer.
Magic Photo Storage Website is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Star FTP server 1.10 is vulnerable to a remote DoS attack due to a stack overflow vulnerability. The vulnerability is triggered when a malicious user sends a specially crafted RETR command with an overly long argument to the FTP server. This causes the stack to overflow and the server to crash.
The vulnerability exists due to the use of user-supplied input in the 'module_root_path' parameter of 'meeting_constants.php' script without proper sanitization. This can be exploited to include arbitrary files from local and external resources by passing a malicious path in the 'module_root_path' parameter.