• Skip to main content
  • Skip to footer

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

Perlpodder Crafted URL Arbitrary Command Execution

Network Security News – Monday, June 05, 2006 Events

Perlpodder Crafted URL Arbitrary Command Execution

Perlpodder contains a flaw that may allow a malicious user to execute arbitrary commands on the victim's system. The issue is triggered because the software fails to properly sanitise input from a podcast server in the shape of a podcast URL before passing it to a shell command. A malicious podcast server could therefore embed shell commands in the URL, resulting in the execution of these commands and hence of a loss of integrity.. Read more at osvdb.org/25708

PHP-Fusion last_seen_users_panel.php settings[locale] Variable Local File Inclusion

PHP-Fusion contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to last_seen_users_panel.php script not properly sanitizing user input supplied to the "settings[locale]" variable. This may allow an attacker to include a file from a local host that contains arbitrary commands which will be executed by the vulnerable script.. Read more at osvdb.org/25538

phpListPro in.php returnpath Variable Remote File Inclusion

phpListPro contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the in.php script not properly sanitizing user input supplied to the 'returnpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.. Read more at osvdb.org/25905

phpListPro addsite.php returnpath Variable Remote File Inclusion

phpListPro contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the addsite.php script not properly sanitizing user input supplied to the 'returnpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.. Read more at osvdb.org/25906

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Footer

Miscellaneous

  • Free Address Finder
  • HTML Encoder Decoder
  • Website Monitoring
  • Whats My IP Address?
  • Yes or No

Copyright © 2001-2024 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About
  • Acronyms
  • DLL Files
  • Ports
  • Computer Security News
  • Email Scams & Spam
  • Internet Safety
  • Free Software