The vulnerability allows an attacker to execute arbitrary commands on the target system remotely through the ShoutBox script. By manipulating the 'sb_include_path' parameter, an attacker can include a malicious file that contains the command to be executed. This can lead to unauthorized access, data theft, and other malicious activities.
A buffer overflow in dtmail makes it possible for a local user to gain elevated privileges. Due to improper bounds checking, it is possible to cause a buffer overflow in dtmail by filling the MAIL environment variable with 2000 or more characters. This results in the overwriting of stack variables, including the return address, and can allow a local user to gain an effective GID of mail.
A hostile client program can be used to generate a large number of forged client queries on behalf of a target user. The server's responses flood the target user, consuming the target system's network bandwidth and CPU cycles. Other games may also be affected by similar issues, and additional amplification attacks may be possible through the usage of commands that return detailed information about the game status or server information.
An attacker can create a malicious archive file with an unusually high compression ratio. When this file is uncompressed by a scanner process, it can consume significant amounts of available disk space.
Admidio 2.3.5 is prone to XSS and SQLi vulnerabilities. The SQLi vulnerability can be exploited by sending a malicious request to 'adm_program/modules/lists/lists.php?active_role=' parameter. The XSS vulnerability can be exploited by injecting a script in the 'headline' parameter of 'adm_program/modules/guestbook/guestbook_new.php'.
A potential denial of service vulnerability exists in several TCP stack implementations. TCP has a MSS (maximum segment size) option that is used by a TCP client to announce to a peer the maximum amount of TCP data that can be sent per segment. By setting the MSS to a low value (such as 1) and making requests for large amounts of data through a TCP service, an attacker could effectively cause a denial of service by causing a large workload on a system.
An xdm server compiled without WrapHelp.c is vulnerable to a brute force X cookie attack, due to using trivially guessed numbers to secure the session, via gettimeofday(). This makes it possible for a remote user to potentially gain access to the display.
There exists a remotely exploitable buffer overflow in Oracle TNS Listener component, which allows remote attackers to execute arbitrary code on affected hosts without requiring authentication. On Windows 2000/NT4 systems, the TNS Listener runs with 'LocalSystem' privileges, giving the attacker full control over the system. On Unix systems, exploitation of this vulnerability would provide an attacker with local access to the victim host.
Under certain circumstances, an access validation error may exist in the handling of process-specific 'mem' files in the Linux /proc filesystem. This could allow an attacker to reposition the read offset of the file to an arbitrary location prior to executing a setuid program that obtains data from stdin.
Icecast audio-streaming server does not properly sanitize user-supplied input, allowing remote attackers to cause a denial of service (crash) by adding a slash, backslash, or period to the end of a crafted URL.