Pivot is affected by a remote file include vulnerability contained within the module_db.php script. This issue is due to a failure of the application to properly sanitize user-supplied input before including it as a parameter to a file include function call. This issue may be exploited to force the affected application to execute attacker supplied PHP script code. This may allow for command execution on the underlying system as well as other attacks.
A vulnerability exists in Internet Explorer that allows an attacker to crash the application when the user tries to invoke the "Save As" option on a malicious HREF URI.
This vulnerability allows a local attacker to manipulate the execution flow of the vulnerable HP-UX X Font Server application, leading to the execution of arbitrary machine code with the privileges of the 'bin' group. An exploit script is provided to gain a shell with bin group privileges.
A local denial of service vulnerability is reported to affect the Sygate Personal Firewall. It is reported that the smc.exe service may be crashed using the List-View Control in the Sygate Personal Firewall GUI. This issue may be exploited in conjunction with the issue described in BID 10540, in order to completely disable the affected firewall as an unprivileged user.
FreeIPS is susceptible to a denial of service vulnerability. It scans TCP connections for particular strings defined by regular expressions. If a packet matches the regular expression, FreeIPS assumes malicious intent and attempts to close the TCP connection. However, the packet sent to the server is incorrectly generated and contains invalid sequence and acknowledgment numbers, which are ignored. An attacker can exploit this vulnerability to deny service to any TCP application protected by FreeIPS, thereby denying network service to legitimate users. The attacker would need to know or guess a string pattern that matches a regular expression in FreeIPS.
Stack-based buffer overflow in the Novell NCP implementation in NetIQ eDirectory 8.8.7.x before 8.8.7.2 allows remote attackers to have an unspecified impact via unknown vectors.
This vulnerability allows an attacker to bypass authentication in SonicWALL GMS/Viewpoint/Analyzer by exploiting a flaw in the /sgms/ endpoint.
This script exploits a vulnerability in Fastgraf's whois.cgi script, allowing an attacker to execute arbitrary commands on the target server. By sending a specially crafted POST request, the attacker can inject a command in the 'host' parameter and execute it on the server. The script then captures the output of the command and displays it. This vulnerability was discovered by Marco van Berkum and the script can be found on his homepage at http://ws.obit.nl.
The 'ssi.php' script in Invision Power Board is prone to a cross-site scripting vulnerability. This vulnerability occurs due to a lack of sufficient sanitization in the 'ssi.php' script when processing the user-influenced 'f' parameter. An attacker can exploit this vulnerability to steal cookie-based authentication credentials and potentially perform other malicious activities.
A remote user can launch cross-site scripting attacks by injecting malicious code through the 'msg' parameter in the 'shoperror.asp' script.