• Skip to main content
  • Skip to footer

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

Owl Intranet Engine lib/OWL_API.php xrms_file_root Variable Remote File Inclusio

Network Security News – Thursday, March 09, 2006 Events

Owl Intranet Engine lib/OWL_API.php xrms_file_root Variable Remote File Inclusion

Owl Intranet Engine contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the 'lib/OWL_API.php' not properly sanitizing user input supplied to the 'xrms_file_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.. Read more at osvdb.org/23734

RevilloC MailServer USER Command Remote Overflow

A remote overflow exists in MailServer. The software fails to check the boundaries of input submitted to the POP3 'USER' command, resulting in a heap overflow. With a specially crafted request, an attacker can cause arbitrary code execution, resulting in a loss of integrity.. Read more at osvdb.org/23735

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Footer

Miscellaneous

  • Free Address Finder
  • HTML Encoder Decoder
  • Website Monitoring
  • Whats My IP Address?
  • Yes or No

Copyright © 2001-2021 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About
  • Acronyms
  • DLL Files
  • Ports
  • Computer Security News
  • Email Scams & Spam
  • Internet Safety
  • Free Software