search for: hijack

Displaying 20 results from an estimated 643 matches for "hijack".

2006 Mar 02
1
test to correct hijacking
I am sorry for hijacking msgs. I didn't realize I was doing that for sure. I hope that this msg appears as a new msg and NOT any hijacked msg. please reply either way k so i can correct it. thx, John Rose
2009 Apr 17
1
Hijacking threads
From: "Phil Schaffner" <P.R.Schaffner at IEEE.org> > > Ed, > > I'm sure your contribution would be much appreciated, but please do not > hijack threads by doing a Reply and changing the subject. Your post > shows up embedded in the thread due to mail headers that preserve the > context and messes up threaded mail readers that many people use. > Please start with a new message, not a Reply. > > Regards, > Phil I'd s...
2015 Sep 01
5
llvm cfi
I want to create an experiment to show the effectiveness of cfi : For example , I first need a program with vulnerability so that we can hijack its control flow; then I enforce cfi of llvm and we can't hijack its control flow. Do you have any advice for me? - mudongliang -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20150901/c217604a/attac...
2013 Mar 26
2
Using rack.hijack with ActionController::Live
Pinging @tenderlove Some questions on how best to move forward with this: 1.) AC::Live is making use of the stream object on ActionDispatch::Response. Should the rack.hijack_io object be used instead of this in AC::Live or should ActionDispatch::Response be changed to use rack.hijack_io? 2.) What do you think about changing AC::Live to work with adapters? I suspect the primary use case for AC::Live will be for websockets, it would be nice to set a websocket adapte...
2014 Nov 14
6
[Bug 10936] New: Rsync path hijacking attack vulnerability
https://bugzilla.samba.org/show_bug.cgi?id=10936 Bug ID: 10936 Summary: Rsync path hijacking attack vulnerability Product: rsync Version: 3.1.1 Hardware: All OS: All Status: NEW Severity: critical Priority: P5 Component: core Assignee: wayned at samba.org Reporter: gaojianfeng...
2019 Dec 06
1
VPN connections subject to hijack attack
On Fri, 6 Dec 2019 at 04:40, Kenneth Porter <shiva at sewingwitch.com> wrote: > > <https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/> > Thanks for the heads up > This affects all VPNs and is a consequence of using "loose" reverse path > filtering for anti-spoofing. The default CentOS setting is strict filtering > but you may have changed this to loose for some unusual routing situation...
2008 Aug 20
3
[Bug 17220] New: Swfdec does not support Clipboard Hijack Attacks
http://bugs.freedesktop.org/show_bug.cgi?id=17220 Summary: Swfdec does not support Clipboard Hijack Attacks Product: swfdec Version: 0.7.x Platform: x86 (IA32) URL: http://it.slashdot.org/it/08/08/20/0029220.shtml OS/Version: Linux (All) Status: NEW Severity: trivial Priority: lowest Component: plugin...
2013 Jan 29
2
unicorn 4.6.0pre1 - hijacking support!
Installing from RubyGems.org: gem install --pre unicorn >From db919d18e01f6b2339915cbd057fba9dc040988b Mon Sep 17 00:00:00 2001 From: Eric Wong <normalperson at yhbt.net> Date: Tue, 29 Jan 2013 21:02:55 +0000 Subject: [PATCH] unicorn 4.6.0pre1 - hijacking support This pre-release adds hijacking support for Rack 1.5 users. See Rack documentation for more information about hijacking. There is also a new --no-default-middleware/-N option for the `unicorn'' command to ignore RACK_ENV within unicorn. --- GIT-VERSION-GEN | 2 +- 1 file change...
2008 May 15
1
"possible hijacking of X11-forwarded connections" bug has not been fixed completely
...LISTENtcp 0 0 *.6010 *.* LISTENtcp 0 0 *.6010 *.* LISTENtcp 0 0 *.6010 *.* LISTEN 6. user sway2 starts any X program will end with being hijacked by user "sway" leanne at sshpa4# xclock 7. hijacked by user "sway" sway at sshpa4# /opt/netcat/bin/nc -l -p 6010 -v -v -s sshpa4.chn.hp.comlistening on [16.157.129.223] 6010 ...connect to [16.157.129.223] from sshpa4.chn.hp.com [16.157.129.223] 54765B MIT-MAGIC-COOKIE-1?bs??...
2008 May 16
4
[Bug 1464] New: "possible hijacking of X11-forwarded connections" bug has not been fixed completely
https://bugzilla.mindrot.org/show_bug.cgi?id=1464 Summary: "possible hijacking of X11-forwarded connections" bug has not been fixed completely Classification: Unclassified Product: Portable OpenSSH Version: 5.0p1 Platform: Other OS/Version: HP-UX Status: NEW Severity: security...
2019 Dec 06
0
VPN connections subject to hijack attack
<https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/> This affects all VPNs and is a consequence of using "loose" reverse path filtering for anti-spoofing. The default CentOS setting is strict filtering but you may have changed this to loose for some unusual routing situations. Check that the value of /proc/sys/net/i...
2006 Mar 01
0
Configuration call hijack for users in a hunting group ?
Hello list We've installed asterisk@home 2.6 at the office :) I'm trying to set call hijacking for users The way this should work is this: When call comes in, a user would dial some phone code (like *8# - what we had in the old 1.0.9 setup) and pick up the call. How can I do this for the 2.6 setup ? Can it be done from the AMP web managment portal ? Our setup uses the zapata.conf file...
2019 Feb 20
2
Bug in print.default: dispatches to global show instead of methods::show
...at it seems that when an S4 object is printed with print(), a similar issue happens. I do realize that S4 objects should be printed with show() rather than print(), which would solve the issue, but this still seems like a bug to me. Example: library(methods) show <- function(...) message("hijacked!") setClass("Test", representation(test = "character")) test <- new("Test") print(test) # hijacked! [[alternative HTML version deleted]]
2015 Sep 02
3
llvm cfi
...t/tree/master/test/cfi > > On Mon, Aug 31, 2015 at 7:43 PM, 慕冬亮 via llvm-dev <llvm-dev at lists.llvm.org > > wrote: > >> I want to create an experiment to show the effectiveness of cfi : >> For example , >> I first need a program with vulnerability so that we can hijack its >> control flow; >> >> then I enforce cfi of llvm and we can't hijack its control flow. >> >> Do you have any advice for me? >> >> - mudongliang >> >> >> >> >> >> ______________________________________________...
2004 May 17
1
Mail Server in the DMZ question
Been trying to puzzle through a firewall layout here involving E-Mail. Would have thought this was a more common kind of scenario, but I haven't been able to Google me up an answer to this one. At present I have an SMTP server (Postfix) in my DMZ that is simply re-routing mail into my secure network. This is a less than optimal setup simply due to having to allow traffic from the DMZ
2004 Aug 06
1
Icecast2 Beta 1 hijacks CPU
I'm running Icecast 2 Beta 1 which satisfies my needs - high quality audio serving @ reasonably low bitrates. The problem is however that it tends to hog the CPU resources after having run for like a day/day and a half. Source and client connections fail when this happens. I'm using psmon to monitor icecast (respawn when it dies or kill/respawn when it starts to eat CPU). I use
2010 Mar 24
1
This is a test, hijack this
Hello Asterisk, This is only a test, because I can't start new thread in this list... -- Best regards, Gergo mailto:csibra at gmail.com
2007 Apr 13
2
Is JavaScript JSON Hijacking problems present/considered in Prototype's coming release?
I sort of let things loose on Prototype''s growth for awhile - yet, as the article (found here: http://webreflection.blogspot.com/2007/04/are-130-byte-enought-to-solve.html) came before me, the question arose: ''is the issue considered in Prototype?'' I couldn''t find a bug regarding it: the one in German isn''t counted. ) So I roll it in here. Please
2015 Mar 19
3
[LLVMdev] How will OrcJIT guarantee thread-safety when a function is asked to be re generated?
Hi Sanjoy, > You need the hijack-return-pc approach *in addition* to a call-site > patching approach. Modifying the return PC lets you guarantee that > nothing will *return* into the old generated code. To guarantee that > nothing will *call* into it either you could use a double indirection > (all calls go through a...
2004 Aug 06
0
Icecast2 Beta 1 hijacks CPU
Detailied instructions.... Not a very simple task I'm afraid. I'll try anyway. For starters I've only compiled libogg (CVS snapshots), libvorbis (CVS snapshots) and icecast beta 1 (from icecast.org's Download page). I didn't bother with ices, libshout, etc. since I use Winamp icw Oddcast to provide the source for icecast. All compiled using: ./configure