Displaying 3 results from an estimated 3 matches for "1q48nt5".
2016 Mar 24
3
C5 MySQL injection attack ("Union Select")
...happened on 22-Jan-2013 and was in
CentOS-5.9 .. we are now in 5.11 and there have been upgrades to mysql55
since then to fix security issues.
Here is more info on this MySQL 5.0 to 5.5 upgrade, that was required
starting in CentOS 5.10.
http://red.ht/1o8VkHN
http://red.ht/1UK30hR
http://red.ht/1q48NT5
Thanks,
Johnny Hughes
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: OpenPGP digital signature
URL: <http://lists.centos.org/pipermail/centos/attachments/20160324/e48c019c/attachment-0001....
2016 Mar 24
0
C5 MySQL injection attack ("Union Select")
...e are now in 5.11 and there have been upgrades to mysql55
> since then to fix security issues.
>
> Here is more info on this MySQL 5.0 to 5.5 upgrade, that was required
> starting in CentOS 5.10.
>
> http://red.ht/1o8VkHN
>
> http://red.ht/1UK30hR
>
> http://red.ht/1q48NT5
Thanks. Reading it now.
--
Regards,
Paul.
England, EU. England's place is in the European Union.
2016 Mar 24
10
C5 MySQL injection attack ("Union Select")
mysql Ver 14.12 Distrib 5.0.95, for redhat-linux-gnu (x86_64) using
readline 5.1
I spotted something strange and immediately installed a routine to
automatically impose an iptables block when the key used for database
access is excessively long.
My URL was something like this
...../...../.....php?key=123456
The injection was something like this