Reports Server is vulnerable to an information disclosure vulnerability. Under some circumstances, Reports Server may yield sensitive information to unauthenticated remote users. This information may include the system path, software installed on the vulnerable system, and other information that may be used as points of entry.
A vulnerability has been reported in certain VirusWall versions. Reportedly, it is possible to bypass the scanning mechanism of VirusWall by adding extraneous spaces in certain email HTTP header fields. A malicious email server may add extraneous whitespace in certain email headers. This would cause VirusWall to ignore the malicious email and not scan it. However, many popular email client programs, including Outlook, will ignore this header and display the content regardless. This may allow malicious content to bypass VirusWall and still be interpreted by a client system.
A vulnerability has been reported in the Pickle implementation included with some versions of Python. If specially crafted malicious object data is 'unpickled', it may cause arbitrary Python commands to be executed, including system calls. This is accomplished by specifying an available function as the class constructor.
PHP-Wiki does not sufficiently sanitize HTML from URI parameters, making it prone to cross-site scripting attacks. An attacker may exploit this condition by enticing users to visit a malicious link which contains attacker-supplied script code.
A cross-site scripting issue has been reported in the default error page used by Sitespring. When an HTTP 500 error is returned, some user-supplied data is included in the generated HTML. Since this data isn't properly sanitized, an attacker may be able to include arbitrary HTML, including JavaScript.
A vulnerability has been reported for Oddsock Song Requester 2.1, where an attacker can make a request to 'request.cgi' using a long value for the 'listpos' parameter, which can cause Song Requester and WinAmp to crash. This condition may be due to a buffer overflow, which could lead to code execution.
The AOL Instant Messenger client is prone to an issue which may allow maliciously crafted HTML to perform unauthorized actions (such as adding entries to the buddy list) on behalf of the user of a vulnerable client. This condition is due to how the client handles 'aim:' URIs. These actions will be taken without prompting or notifying the user. A web page loaded with the above code in the META REFRESH tag will automatically add a group called mindfliporg and add the users mindfliporg, mfliporb, mflipmax, mflips0nic, mflipzorcon to buddy list.
ICQ is an instant messenger client for Microsoft Windows systems. ICQ includes support for sound schemes. ICQ sound scheme files are generally given the .scm extension. Reportedly, it is possible for a remote party to modify sound settings in ICQ by forcing a vulnerable user to access a blank .scm file. Allegedly, this may be done if the user views maliciously formatted HTML under some browsers. The HTML must reference a sound scheme file within an IFRAME tag.
A vulnerability has been reported in the IMHO Roxen webmail module which may enable a malicious user of the webmail system to gain access to the account of another user. This issue is due to an error in configuration which may leak the REFERER for a session with the webmail system, which an attacker may use to access another webmail account. Login with an valid user/passwd, Logout and Goto URL : (((webmail_URL)))/(old_error,plain)/mail/error?error=1 This will cause the webserver to display a REFERER. This REFERER may be submitted to access another user's session.
BadBlue is a P2P file sharing application distributed by Working Resources. It is available for Microsoft Windows operating systems. It has been discovered that a request passed to a BadBlue server containing a null byte at the end of a file name will return the contents of the file. This type of request can be applied to gain access to sensitive information, such as the BadBlue configuration file.