Symantec Norton Internet Security 2003 is reported to be prone to a denial of service condition. It is possible to trigger this condition by sending an excessive (approximately 65500 or more) number of ICMP packets to a host running Norton Internet Security. This may cause a denial of service and possible system instability. For this issue to be present remotely, the software must be configured to allow ICMP packets and the firewall must be enabled. Otherwise, it is possible to trigger this condition locally.
An attacker can construct a URL consisting of dot-dot-slash (../) character sequences to obtain access to files outside of the document root. It should be noted that only files accessible by the web server will be disclosed to the attacker.
W-Agora is vulnerable to a file disclosure vulnerability due to inadequate sanitization of user-supplied input. An attacker can construct a URL consisting of dot-dot-slash (../) character sequences to obtain access to files outside of the document root.
phpPass is vulnerable to SQL injection attacks due to insufficient sanitization of user-supplied input. This allows an attacker to inject arbitrary SQL into the database used by a vulnerable site, allowing them to view pages that would normally be restricted. An example of an attack is the following: http://[target]/protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''='
When mpg123 is used to play certain MP3 files with malformed headers, it may be possible to cause mpg123 to execute malicious attacker-supplied code.
A vulnerability exists in the Reminder.php script distributed as part of YaBB SE due to insufficient sanitizing of input. This allows a remote user to inject arbitrary SQL into the database used by YaBB SE that could be used to reset or change the password of a user.
Xynph FTP Server is vulnerable to a directory traversal attack, which allows a remote attacker to escape the FTP root directory using relative path notation. This could allow the attacker to gain unauthorized access to the system.
The Half-Life StatsMe plug-in is prone to an exploitable format string vulnerability. This issue may be exploited by an attacker who can authenticate with the rcon-password of the Half-Life server to execute arbitrary code in the context of the server process. Exploitation may be dependant on which other plug-ins are running on the Half-Life server. Successful exploitation will allow an attacker to gain local and possibly privileged access to the host running the server.
The Half-Life StatsMe plug-in is prone to an exploitable buffer overflow condition. This issue may be exploited by an attacker who can authenticate with the rcon-password of the Half-Life server to execute arbitrary code in the context of the server process. Exploitation may be dependant on which other plug-ins are running on the Half-Life server. Successful exploitation will allow an attacker to gain local and possibly privileged access to the host running the server.
FormMail-clone is allegedly prone to cross-site scripting attacks. The FormMail-clone script does not sufficiently sanitize HTML tags and script code. As a result, a remote attacker may construct a malicious link to the script which contains arbitrary script code. If this link is visited by a web user, the attacker-supplied script code may be interpreted by their browser in the context of the site hosting the software.