A vulnerability exists in LocalWEB2000 related to content password protection. It is possible to have LocalWEB2000 treat files as unprotected by requesting them as files within the '.' (current) directory. If the file http://server/file.txt is set to be password protected, the protection will be bypassed if a request is made for http://server/./file.txt. This is likely due to a design error in the protection component.
ViewCVS does not filter HTML tags from certain URL parameters, making it prone to cross-site scripting attacks. An attacker may exploit this by constructing a malicious link with script code to a site running ViewCVS and sending it to a legitimate user of the site. When the legitimate user follows the link, the attacker's script code is executed in their web client in the security context of the website running ViewCVS.
When the CBOS TCP/IP stack is forced to process a high number of unusually large packets, it will consume all memory. This will cause the router to freeze and stop forwarding packets.
A denial of service condition occurs when the JSPServlet is sent an overly long request either directly or via a request for a JSP file. It has been reported that this will cause the underlying webserver to crash. This condition may be the result of insufficient bounds checking, though this possibility has not been confirmed.
ServletExec/ISAPI is a plug-in Java Servlet/JSP engine for Microsoft IIS. It is vulnerable to a directory traversal attack, which allows an attacker to access arbitrary files within the webroot directory by sending a request containing URL encoded directory traversal sequences.
ServletExec/ISAPI is a plug-in Java Servlet/JSP engine for Microsoft IIS. It runs with IIS on Microsoft Windows NT/2000/XP systems. ServletExec/ISAPI discloses the absolute path to the webroot directory when sent a specially formatted request without a trailing filename. This type of sensitive information may aid in further attacks against the host running the vulnerable software.
It has been reported that it is possible to cause a denial of service in some Cisco routers by sending a large amount of spoofed ICMP redirect messages. To generate random ICMP redirect messages, a sender tool is available at http://www.phenoelit.de/irpas/icmp_redflod.c, which has to be linked with the IRPAS packet library. On high bandwidth networks, the command line switch -w0 can be used to increase the sending rate.
Matu FTP Server is vulnerable to a buffer overflow condition. It is possible for a malicious user to craft a request that will result in code execution on the vulnerable system. This issue has been reported in Matu FTP Server 1.13. Other versions may also be affected.
mcNews does not sufficiently filter dot-dot-slash (../) sequences from URL parameters, allowing a remote attacker to disclose the contents of arbitrary web-readable files that exist on a host running the vulnerable software.
Hosting Controller is an application which consolidates all hosting tasks into one interface. Hosting Controller runs on Microsoft Windows operating systems. The 'browse.asp' script is prone to an issue which may allow a remote attacker to view the contents of arbitrary files and directories. The attacker must provide a malicious value as a URL parameter in a request for the affected script, which will be read with the privileges of the web server process.