Sendmail is prone to a remotely buffer-overflow vulnerability in the SMTP header parsing component. Successful attackers may exploit this vulnerability to gain control of affected servers.
The vulnerability exists due to insufficient bounds checking on input supplied via the HCP URI parameter. An attacker can exploit this vulnerability by making a HCP request with an overly long string. This will trigger the overflow condition and may result in malicious attacker-supplied code being executed on the vulnerable system.
A buffer overflow vulnerability exists in AbsoluteTelnet due to insufficient bounds checking when setting the title bar of the client. An attacker can exploit this vulnerability by enticing a victim user to view a website with malicious HTML tags, leading to a buffer overflow condition and potential code execution.
A directory traversal vulnerability has been discovered in several games that use certain versions of the Unreal Engine. Attackers can exploit this vulnerability to navigate outside of the game's installation directory by utilizing directory traversal sequences. By referencing specific files, it is also possible to cause the game client to crash.
A memory corruption bug exists in games based on the Unreal Engine. When the game client connects to a server using an excessive length Unreal URL, it may be possible for the malformed URL to overwrite sensitive areas of stack memory, causing the client to crash.
The history object in Opera 7 browsers on Windows exposes the properties history.next and history.previous, which can be used by any website to track a user's web surfing habits.
Division by zero vulnerability during the handling of the (.mov) files. That will trigger a denial of service condition.
Remote attackers can view directory contents and disclose the contents of files by exploiting the vulnerability in Apache Tomcat.
This exploit allows an attacker to add unlimited votes to a Joomla poll component regardless of php.ini settings. It works by manipulating the pollid and voteid parameters in the URL.
A vulnerability has been reported in several games that support the use of the GameSpy network. The vulnerability allows a game server to respond with overly large responses to a simple query by a client, which can result in the saturation of available network bandwidth. This can be exploited to launch denial of service attacks against other hosts and networks.