Computer Security
[EN] securityvulns.ru no-pyccku


Spamassassin spam filtering engine code execution
Published:06.06.2006
Source:
SecurityVulns ID:6222
Type:remote
Threat Level:
7/10
Description:Code execution is possible with malformed message if spamd is executed with options -v and -P.
Affected:APACHE : SpamAssassin 3.1
Original documentdocumentDEBIAN, [Full-disclosure] [SECURITY] [DSA 1090-1] New spamassassin packages fix remote command execution (06.06.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod