ASP-DEV Discussion Forum contains a vulnerability that exposes potentially sensitive information, allowing an attacker to gain access to user credentials. User credentials are stored in the sub-directory http://www.example.com/forum/admin/user_data/.
It has been reported that the FTP gateway component within the gopherd server is prone to a buffer overflow vulnerability. This vulnerability may be present due to a failure to perform bounds checking when processing long filenames returned from the FTP LIST command. This could permit code execution in the context of the software. When exploiting this bug, it is made moderately easy by gopherd. Because, the buffer that holds the string is 8192 bytes, and on the stack. Meaning the amount of NOPs used can be around ~7500.
Mabry Software HTTPServer/X is prone to directory traversal attacks. This could be exploited by a remote attacker to gain access to sensitive files on a system hosting the web server implementation.
A buffer overflow vulnerability has been reported in IglooFTP. The vulnerability occurs when IglooFTP is parsing 'Welcome' banner messages from remote FTP servers. When IglooFTP receives an FTP banner exceeding a certain length, it will trigger the overflow condition. This could allow for execution of malicious code in the context of the FTP client.
It has been reported that VP-ASP does not sufficiently sanitize user input passed to the shopexd.asp script contained in the software. As a result, it may be possible for remote attackers to embed SQL commands which are to be passed to the underlying database engine.
ChangshinSoft ezTrans Server is vulnerable to an arbitrary file disclosure vulnerability. This vulnerability is due to a lack of proper input validation in the download.php script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request will contain a maliciously crafted filename parameter that will allow the attacker to view arbitrary files on the server. This may result in the disclosure of potentially sensitive information.
Zone-H has reported that the Q-Shop ASP shopping cart software contains a vulnerability that may allow remote attackers to upload arbitrary files. Once uploaded, the attacker may be able to have the script executed in the security context of the Web server. It is reported that Q-Shop provides an interface intended for administrators to upload files, however when this file is requested directly, no authentication is required.
A problem with the software may make elevation of privileges possible. It has been reported that a buffer overflow exists in Tower Toppler. A local user may be able to exploit this issue to execute code with the privileges of the toppler program. A Buffer overflow in HOME enviroment variable. Just your standard stack overflow... Should give a GID=20 on successful exploitation.
It has been reported that Microsoft Windows does not properly handle named pipes through the CreateFile API. Because of this, an attacker may be able to gain access to the SYSTEM account.
A denial of service vulnerability exists in the Canon GP-300 print server. The vulnerability is triggered when a malformed web request is sent to the server. This will cause the server to crash, denying service to legitimate users.