|
14 | 14 | <guid>/docs/alerts/90039/</guid> |
15 | 15 | <description><p>MongoDB query injection may be possible.</p></description> |
16 | 16 | </item> |
| 17 | + <item> |
| 18 | + <title>Remote Code Execution - Shell Shock</title> |
| 19 | + <link>/docs/alerts/10048-2/</link> |
| 20 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 21 | + <guid>/docs/alerts/10048-2/</guid> |
| 22 | + <description><p>The server is running a version of the Bash shell that allows remote attackers to execute arbitrary code.</p></description> |
| 23 | + </item> |
| 24 | + <item> |
| 25 | + <title>Server Side Template Injection (Blind)</title> |
| 26 | + <link>/docs/alerts/90036/</link> |
| 27 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 28 | + <guid>/docs/alerts/90036/</guid> |
| 29 | + <description><p>When the user input is inserted in the template instead of being used as argument in rendering is evaluated by the template engine. Depending on the template engine it can lead to remote code execution.</p></description> |
| 30 | + </item> |
| 31 | + <item> |
| 32 | + <title>SQL Injection - Hypersonic SQL</title> |
| 33 | + <link>/docs/alerts/40020/</link> |
| 34 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 35 | + <guid>/docs/alerts/40020/</guid> |
| 36 | + <description><p>SQL injection may be possible.</p></description> |
| 37 | + </item> |
| 38 | + <item> |
| 39 | + <title>SQL Injection - MsSQL</title> |
| 40 | + <link>/docs/alerts/40027/</link> |
| 41 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 42 | + <guid>/docs/alerts/40027/</guid> |
| 43 | + <description><p>SQL injection may be possible.</p></description> |
| 44 | + </item> |
| 45 | + <item> |
| 46 | + <title>SQL Injection - MySQL</title> |
| 47 | + <link>/docs/alerts/40019/</link> |
| 48 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 49 | + <guid>/docs/alerts/40019/</guid> |
| 50 | + <description><p>SQL injection may be possible.</p></description> |
| 51 | + </item> |
| 52 | + <item> |
| 53 | + <title>SQL Injection - Oracle</title> |
| 54 | + <link>/docs/alerts/40021/</link> |
| 55 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 56 | + <guid>/docs/alerts/40021/</guid> |
| 57 | + <description><p>SQL injection may be possible.</p></description> |
| 58 | + </item> |
| 59 | + <item> |
| 60 | + <title>SQL Injection - PostgreSQL</title> |
| 61 | + <link>/docs/alerts/40022/</link> |
| 62 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 63 | + <guid>/docs/alerts/40022/</guid> |
| 64 | + <description><p>SQL injection may be possible.</p></description> |
| 65 | + </item> |
| 66 | + <item> |
| 67 | + <title>SQL Injection - SQLite</title> |
| 68 | + <link>/docs/alerts/40024/</link> |
| 69 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 70 | + <guid>/docs/alerts/40024/</guid> |
| 71 | + <description><p>SQL injection may be possible.</p></description> |
| 72 | + </item> |
17 | 73 | </channel> |
18 | 74 | </rss> |
0 commit comments