S-137: yarssr vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-137: yarssr vulnerability
# 1  
Old 01-29-2008
S-137: yarssr vulnerability

It was discovered that yarssr, an RSS aggegator and reader, performs insufficient input sanitising, which could result in the execution of arbitrary shell commands if a malformed feed is read. The risk is MEDIUM. yarssr performs insufficient input sanitising, which could result in the execution of arbitrary shell commands if a malformed feed is read.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. News, Links, Events and Announcements

Bash vulnerability

Not sure if there is a post about it here somewhere already. Anyway: Remote exploit vulnerability in bash CVE-2014-6271 | CSO Online (3 Replies)
Discussion started by: zaxxon
3 Replies

2. Shell Programming and Scripting

error code 137 and error code 35072

Hi while trying to run few scripts /afs/ae.ge.com/informatica/ardw/dev/bin/cdw_ar_update_recvbal.sh this script contains the below data load_dir=/afs/ae.ge.com/informatica/ardw/dev/data prog_dir=/afs/ae.ge.com/informatica/ardw/dev/bin ctl_dir=/afs/ae.ge.com/informatica/ardw/dev/ctl... (1 Reply)
Discussion started by: laxmi131
1 Replies

3. AIX

lsmksysb: error 0511-119 & 0511-137 ?

I have 2 workstations that when I do the smitty lsmksysb to verify the tape created by the smitty mksysb, both fail on the same problem: restore: 0511-119 There is a missing header block. restore: 0511-137 Trying to find the next header. Data maybe lost. Starting again at file .... I... (3 Replies)
Discussion started by: Browser_ice
3 Replies

4. Filesystems, Disks and Memory

Exit code 137 on a backup

Can some one tell me what it means to get a exit code od 137 from a cron scheduled backup on HP-UX. Also if you know of a book that has the HP-UX codes that would be great. Thanks (4 Replies)
Discussion started by: twins
4 Replies

5. UNIX for Dummies Questions & Answers

Vulnerability Alerts

Aside from CERT, are there any additional sources for unix/linux vulnerabilities? (1 Reply)
Discussion started by: kmgrady01
1 Replies

6. Cybersecurity

SNMP Vulnerability

SNMP Vulnerability: In a few minutes wire services and other news sources will begin breaking a story about widespread vulnerabilities in SNMP (Simple Network Management Protocol). Exploits of the vulnerability cause systems to fail or to be taken over. The vulnerability can be found in... (1 Reply)
Discussion started by: dpatel
1 Replies
Login or Register to Ask a Question
RSSTAIL(1)							   User Commands							RSSTAIL(1)

NAME
rsstail - a Console Based RSS news reader SYNOPSIS
rsstail [OPTIONS]... -u URL DESCRIPTION
This manual page was written for the Debian distribution because the original program does not have a manual page. Parse a RSS feed and read it, in an output similar to the tail command. OPTIONS
This is a Few Description on the main options for rsstail -t Show timestamp. -N Do not show headings -Z X Add heading 'x' -l Show link -d Show Description -p Show Publication date -a Show author -c Show comments -b X Where X is the limit in bytes for description/comments -z Continue even if there are XML parser errors in the RSS feed. -n X Initially show X items -H Strip HTML tags -o X only show items newer than X[s/M/h/d/m/y] -u URL URL of RSS feed to tai -i Seconds check interval in seconds (default is 15 minutes) -r Print in reverse order -x Proxy proxy server to use (host[:port]) -y ProxyAuth proxy authorization (user:password) -P do not exit when an error occurs -v be verbose (add more to be more verbose) -h Help output -V Show version of program. AUTHOR
This manual page was written by Rene Mayorga <rmayorga@debian.org.sv> for the Debian system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 any later version pub- lished by the Free Software Foundation. On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL. 0.1 RSSTAIL(1)