Computer Security
[EN] securityvulns.ru no-pyccku


Kojoney DoS
Published:25.02.2010
Source:
SecurityVulns ID:10652
Type:remote
Threat Level:
5/10
Description:Insufficient URL filtering in curl and wget emulation allows access to local files and devices, causing memory exhaustion.
Affected:KOJONEY : Kojoney 0.0
Original documentdocumentnicob_(at)_nicob.net, Kojoney (SSH honeypot) remote DoS (25.02.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod