A memory corruption vulnerability has been discovered in Qpopper version 4.0.4 and earlier. The vulnerability occurs when calling the 'mdef' command and a malicious macro name is supplied. By filling a target buffer with a malicious macro name it may be possible to trigger a procedure that would cause sensitive memory to be corrupted. The problem occurs due to the lack of NULL termination by the Qvsnprintf() function. Successful exploitation of this issue may allow a remote attacker to execute arbitrary commands with the privileges of the Qpopper service.
A buffer overrun vulnerability has been discovered in the Opera web browser. The issue affects Opera versions 6 and 7 on the Microsoft Windows platform. Due to insufficient bounds checking when copying file names to a temporary buffer it may be possible for an attacker to corrupt memory. The problem occurs when downloading a file with a name of excessive length. Successful exploitation of this issue may allow an attacker to execute arbitrary commands within a browser that downloads the malicious file.
An attacker can exploit this vulnerability by creating a DATADIR/my.cnf that includes the line 'user=root' under the '[mysqld]' option section. When the mysqld service is executed, it will run as the root user instead of the default user, which may allow an attacker to obtain elevated privileges on a compromised system.
SimpleBBS reportedly creates sensitive files with world-readable permissions. As a result anyone who has access to SimpleBBS web resources may access confidential information stored in the SimpleBBS user database.
A remote command execution vulnerability has been discovered in the Wordit Logbook application. This issue occurs due to insufficient sanitization of externally supplied data to the 'logbook.pl' script. A remote attacker may exploit this condition to gain local, interactive access to the underlying host.
The vulnerability exists in the index.php script file. Some variables are not properly sanitized of malicious shell metacharacters. An attacker can exploit this vulnerability by executing the PHPPing script and include malicious shell metacharacters as values for various parameters.
It has been reported that a buffer overflow exists in Tower Toppler. A local user may be able to exploit this issue to execute code with the privileges of the toppler program.
Eudora may crash when handling messages which contain attachments with excessively long filenames. This condition reportedly occurs when messages with malformed attachment filenames are stored in the user's mailbox, which could result in a persistent denial of service to the mail client.
It has been reported that a vulnerability in the handling of some types of requests exists in lprm. When an attacker sends a maliciously crafted string to a configured printer through the lprm command, it may be possible to execute code.