The Serv-U application is affected by a remote buffer overflow vulnerability in the list parameter. This vulnerability arises due to a lack of proper validation of buffer boundaries during the processing of user input. Successful exploitation of this vulnerability can lead to a denial of service condition and potentially allow an attacker to execute arbitrary code on the affected system with the privileges of the user running the vulnerable application.
The Exchange POP3 e-mail gateway is prone to a remote buffer overflow vulnerability that may allow an attacker to execute arbitrary code on a vulnerable system. This issue could allow an attacker to gain unauthorized access in the context of the affected process.
The first issue is an input validation error that allows for symbolic link attacks, potentially leading to corruption of system files. The second issue is a failure to properly validate buffer boundaries, which may result in crashes and potentially allow for arbitrary code execution.
The phpBB application is prone to a file include vulnerability that can be exploited by remote attackers. This vulnerability allows attackers to include a remote malicious script to be executed on a vulnerable system.
The BitDefender AvxScanOnlineCtrl COM object is affected by a file upload and execution vulnerability. A remote user can specify a file to be uploaded and executed on a system running the affected software. This can result in unauthorized access to the system.
Phorum is affected by a remote SQL injection vulnerability. This issue is due to a failure of the application to properly sanitized user supplied URI input. This issue may allow a remote attacker to manipulate query logic, leading to unauthorized access to sensitive information such as the user password hash or corruption of database data. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation.
The bsd-games mille game is prone to a locally exploitable buffer overrun vulnerability. This issue occurs when the user inputs a file name when saving a game without sufficient bounds checking, allowing an attacker to overwrite adjacent memory locations and potentially execute arbitrary code. This vulnerability can be exploited to escalate privileges, as the game is typically installed setgid games.
A vulnerability in Symantec Norton AntiVirus 2002 allows deeply nested files with specific names to bypass manual scanning. This could allow malicious executable content to go undetected by the software. The issue may be due to a limitation in the Windows operating system that affects accessing deeply nested files. Other antivirus software may also be affected.
The vulnerability occurs when the software attempts to write oversized error messages, which can be triggered remotely by remote users influencing the contents of error messages.
The vulnerability occurs when the application attempts to handle excessively long 'sftp:' or 'scp' addresses, resulting in memory corruption. This can lead to a denial of service condition.