The 'down.asp' script in Snitz Forums is vulnerable to HTTP response splitting. An attacker can manipulate GET requests due to a flaw in the script, allowing them to influence how web content is served, cached, or interpreted.
BBS E-Market Professional is reported prone to multiple file disclosure vulnerabilities. These issues exist due to insufficient sanitization of user-supplied data. A remote attacker can disclose arbitrary Web-readable files by supplying directory traversal sequences such as '../' to the server. This results in improper access to potentially sensitive files located outside of the document root of the web server.
MyServer is prone to a remote directory traversal vulnerability. This issue occurs due to insufficient sanitization of user-supplied data, allowing improper access to potentially sensitive files located outside of the web server's document root.
CUPS is prone to a remotely exploitable denial of service vulnerability that may be triggered through port 631 by a zero-length UDP packet.
The 'referer' parameter in SnipSnap is prone to an HTTP response splitting vulnerability. This allows an attacker to manipulate how POST requests are handled.
Mozilla is prone to a remotely exploitable heap overflow that is exposed when the browser handles non-ASCII characters in URIs. This issue could be exploited by enticing a user to open a hyperlink that references a malicious URI. Successful exploitation will allow execution of arbitrary code in the context of the client user.
QNX Photon MicroGUI is affected by multiple buffer overflow vulnerabilities in MicroGUI utilities. These issues are due to a failure of the affected applications to validate user-supplied string lengths before copying them into finite process buffers. An attacker may leverage these issues to execute arbitrary code on the affected system within the context of the vulnerable applications; the applications are typically setuid applications.
Pingtel Xpressa handsets are prone to a remote denial of service vulnerability due to a lack of sufficient boundary checks performed on HTTP request data handled by the Xpressa administration web server. A remote attacker can exploit this vulnerability to effectively deny service to the affected handset and potentially execute arbitrary code.
The vulnerability allows an attacker to execute the contents of Perl scripts on the affected server's filesystem. This can be done by manipulating the 'lang' parameter in the pdesk.cgi script. The execution occurs within the context of the affected CGI application with the privileges of the web server process. If the attacker does not have direct access to the server, they can still exploit the vulnerability to gather sensitive information through error messages. Additionally, the attacker can leverage the vulnerability to execute other preexisting scripts on the system, potentially aiding them in further attacks.
The vulnerability exists in the 'char_buffer_read' function of the 'ssl_engine_io.c' file in Apache 2.x mod_ssl. It allows remote attackers to crash the server by sending a specific URI.