Impact:
Fixed possible stack buffer overflow in FastCGI SAPI
Impact:Potential DOS and remote code execution if using FastCGI
Updated PCRE to deal with issues fixed in USN-581-1
Impact:potential DOS and code execution
Fixes CVE-2008-0599
Impact:Potential DOS and remote code execution
Fixed a safe_mode bypass in cURL identified by Maksymilian Arciemowicz.
Impact: Potential overwriting of system files if cURL is in use
POC code in the advisory: http://securityreason.com/achievement_securityalert/51
Properly address incomplete multibyte chars inside escapeshellcmd()
Impact: If I understand correctly, useful for bypassing character based filtering, leading to remotely running arbitrary commands on the shell
Impact: Potential DOS and remote code execution if using FastCGI potential DOS and code execution Potential DOS and remote code execution securityreason. com/achievement _securityalert/ 51
Fixed possible stack buffer overflow in FastCGI SAPI
Impact:
Updated PCRE to deal with issues fixed in USN-581-1
Impact:
Fixes CVE-2008-0599
Impact:
Fixed a safe_mode bypass in cURL identified by Maksymilian Arciemowicz.
Impact: Potential overwriting of system files if cURL is in use
POC code in the advisory: http://
Properly address incomplete multibyte chars inside escapeshellcmd()
Impact: If I understand correctly, useful for bypassing character based filtering, leading to remotely running arbitrary commands on the shell