CVE-2007-6341 – Perl Net::DNS 0.48/0.59/0.60 - DNS Response Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-6341
Net/DNS/RR/A.pm in Net::DNS 0.60 build 654, as used in packages such as SpamAssassin and OTRS, allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response. Net/DNS/RR/A.pm en Net::DNS 0.60 construcción 654, utilizado en paquetes como SpamAssassin y OTRS, permite a atacantes remotos provocar denegación de servicio (programa muere(croak)) a través de una respuesta DNS. • https://www.exploit-db.com/exploits/30895 http://search.cpan.org/src/OLAF/Net-DNS-0.63/Changes http://secunia.com/advisories/29343 http://secunia.com/advisories/29354 http://secunia.com/advisories/29446 http://secunia.com/advisories/29555 http://www.debian.org/security/2008/dsa-1515 http://www.mandriva.com/security/advisories?name=MDVSA-2008:073 http://www.securiteam.com/unixfocus/6I00E0UKKQ.html http://www.securityfocus.com/bid/26902 http://www.securitytracker.com/id • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-5521 – Net_DNS 0.3 - '/DNS/RR.php' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-5521
PHP remote file inclusion vulnerability in DNS/RR.php in Net_DNS 0.03 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpdns_basedir parameter. Vulnerabilidad de inclusión remota de archivo en PHP en DNS/RR.php de Net_DNS 0.03 y anteriores permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro phpdns_basedir. • https://www.exploit-db.com/exploits/2614 http://secunia.com/advisories/22522 http://www.securityfocus.com/bid/20666 http://www.vupen.com/english/advisories/2006/4185 https://exchange.xforce.ibmcloud.com/vulnerabilities/29698 https://www.exploit-db.com/exploits/4755 •