Due to a processing issue with environment variables it is possible to leverage bash for command execution through various methodologies.
10416de1b992e9a1adc732bd402d4760e0a76f5de17bf16ba8456967dcec154b
Remote attackers are able to execute arbitrary commands in the context of the TWiki process for TWiki versions 20030201 and possibly in other versions as well. This flaw is due to a lack of proper sanitization of user input.
ac52112bc5ecb5d1c0b1b78be42869a3a5320137a2621f2fc66722fa6a94c04c
The Linux networking code makes extensive use of hash tables to implement caches to support packet classification. One of these caches, the routing cache, can be used to mount effective denial of service attacks, using an algorithmic complexity attack.
2232e1d6ae76ccd63cea548cdd83eb57b45777bd4164b311315385eeb1c8df58