It has been reported that WebC will execute in the directory of a symbolic link from which it is invoked. Because of this, it may be possible for a local user to load a configuration file that enabled dangerous variables.
The Netgear FM114P allows certain ports to be blocked, both for external users attempting to enter the local network and for local users connecting to the WAN. If Remote Access and Universal Plug and Play are both enabled on the WAN interface, a UPnP SOAP request can cause a connection to be intitiated through a port that is normally blocked.
The Netgear FM114P ProSafe Wireless Router is vulnerable to information disclosure. If Remote Access and Universal Plug and Play are both enabled on the WAN interface, a UPnP SOAP request can retrieve the username and password for the WAN interface.
A vulnerability in ChiTex has been reported that may allow local users to obtain root privileges on vulnerable systems. The vulnerability exists due to the existence of two setuid root binaries that execute the 'cat' program without an absolute path. An attacker can exploit this vulnerability by creating a malicious 'cat' file and invoking the setuid binaries. This will result in the execution of the attacker-supplied 'cat' file with root privileges.
It has been reported that it is possible to inject malicious script code into the subject of a message in Phorum. This may be done by constructing a malicious subject line (or other fields) before sending an email to the target victim.
It has been reported that passlogd does not properly handle some types of input. Because of this, an attacker may be able to gain unauthorized access to hosts running the vulnerable software.
A remote user can send a specially crafted request to the vulnerable software, Instant TopTools, which will cause the software to crash and deny service to the host.
The EZ Server software is vulnerable to a buffer overflow attack when it receives strings of excessive length. This can be exploited by sending a string of A characters with a length of 1993 or 1994 to the ls or cd command respectively. This will cause the server to crash, denying service to legitimate users.
A path disclosure vulnerability has been reported for ScozBook. The issue occurs when a request is made to the view.php script page. Access to sensitive filesystem information may aid an attacker in launching further attacks against a target system.
Guestbook is vulnerable to a path disclosure vulnerability when a request is made to the cfooter.php3 PHP script page. This allows an attacker to gain access to sensitive filesystem information which can be used to launch further attacks against the target system.