MegaBBS is prone to multiple vulnerabilities due to insufficient sanitization of user-supplied data. These vulnerabilities can be exploited to carry out HTTP response splitting and SQL injection attacks.
MegaBBS is reported prone to multiple vulnerabilities. These issues exist due to insufficient sanitization of user-supplied data and may allow an attacker to carry out HTTP response splitting and SQL injection attacks.
Alt-N MDaemon is prone to multiple remote buffer overflow vulnerabilities. The vulnerabilities are likely due to a failure of the application to properly validate buffer sizes when processing command argument input. By sending a large argument to certain SMTP commands or an IMAP command, it is possible to cause the application to crash or execute arbitrary code with the privileges of the user running the server on an affected computer.
LaTeX2rtf is susceptible to a remote buffer overflow vulnerability when handling malformed files. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable computer to gain unauthorized access. The issue is due to a failure of the application to perform proper bounds checks before copying data into a fixed-sized memory buffer.
The Pinnacle Systems ShowCenter web-based interface is prone to a remote denial of service vulnerability. The vulnerability exists due to a lack of sanity checks on the Skin parameter of a ShowCenter script. A remote attacker can exploit this vulnerability to persistently deny service to the ShowCenter web-based interface. Any subsequent request to the interface after the attack will result in a 'File or Folder not found' error message.
LeadMind Pop Messenger is prone to a remote denial of service vulnerability. The issue exists because the messenger application fails to gracefully handle certain characters that are received. A remote attacker may exploit this vulnerability to crash the LeadMind Pop Messenger client. Additionally, it is reported that an attacker may broadcast a malicious message to all clients on the connected local network segment and deny service to all of the clients at once.
An attacker can exploit an authentication bypass vulnerability in EmuLive Server4 to gain unauthorized access to administrator scripts, allowing manipulation of server settings. Additionally, a denial of service vulnerability can be exploited to freeze the affected computer, denying service to legitimate users.
Tutos is reported to have multiple remote input-validation vulnerabilities. These vulnerabilities occur due to the inadequate sanitization of user-supplied data, which allows attackers to perform cross-site scripting and SQL injection attacks.