Debian Security Advisory 1578-1 - Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language. The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from various parameters. A denial of service was possible through a malicious script abusing the glob() function. Certain maliciously constructed input to the wordwrap() function could lead to a denial of service attack. Large len values of the stspn() or strcspn() functions could allow an attacker to trigger integer overflows to expose memory or cause denial of service. The escapeshellcmd API function could be attacked via incomplete multibyte chars.
9825e5299540688f4d7bd7f26490f7a68f71187a478c2b2e0f29fe8b48f1420b
LockDown is an application that can be run interactively, non-interactively, or really-non-interactively to lock down a server that runs Red Hat, Fedora, CentOS, or similar systems. It sets things like umask and SGID/SUID, creates a simple firewall, and more.
bd5e27abaabd9e9495ec1c3d01878157918ff1542c6486638c4ef3f0e4c916f8
MercuryBoard versions 1.1.5 and below remote blind SQL injection exploit that takes advantage of login.php.
ee32f61af8073052943ef681d36dd47c25af9298f3665b1cf9e3a534a166d182
AlkalinePHP versions 0.80.00 beta and below remote SQL injection exploit that takes advantage of thread.php.
ae83f781db22a9e3e87928c96d77f4a30c0c53f6d4e6537de919558f6b3dab6e