search for: hijackable

Displaying 20 results from an estimated 643 matches for "hijackable".

Did you mean: hackable
2006 Mar 02
1
test to correct hijacking
I am sorry for hijacking msgs. I didn't realize I was doing that for sure. I hope that this msg appears as a new msg and NOT any hijacked msg. please reply either way k so i can correct it. thx, John Rose
2009 Apr 17
1
Hijacking threads
From: "Phil Schaffner" <P.R.Schaffner at IEEE.org> > > Ed, > > I'm sure your contribution would be much appreciated, but please do not > hijack threads by doing a Reply and changing the subject. Your post > shows up embedded in the thread due to mail headers that preserve the > context and messes up threaded mail readers that many people use. > Please
2015 Sep 01
5
llvm cfi
I want to create an experiment to show the effectiveness of cfi : For example , I first need a program with vulnerability so that we can hijack its control flow; then I enforce cfi of llvm and we can't hijack its control flow. Do you have any advice for me? - mudongliang -------------- next part -------------- An HTML attachment was scrubbed... URL:
2013 Mar 26
2
Using rack.hijack with ActionController::Live
Pinging @tenderlove Some questions on how best to move forward with this: 1.) AC::Live is making use of the stream object on ActionDispatch::Response. Should the rack.hijack_io object be used instead of this in AC::Live or should ActionDispatch::Response be changed to use rack.hijack_io? 2.) What do you think about changing AC::Live to work with adapters? I suspect the primary use case for
2014 Nov 14
6
[Bug 10936] New: Rsync path hijacking attack vulnerability
https://bugzilla.samba.org/show_bug.cgi?id=10936 Bug ID: 10936 Summary: Rsync path hijacking attack vulnerability Product: rsync Version: 3.1.1 Hardware: All OS: All Status: NEW Severity: critical Priority: P5 Component: core Assignee: wayned at samba.org
2019 Dec 06
1
VPN connections subject to hijack attack
On Fri, 6 Dec 2019 at 04:40, Kenneth Porter <shiva at sewingwitch.com> wrote: > > <https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/> > Thanks for the heads up > This affects all VPNs and is a consequence of using "loose" reverse path > filtering for anti-spoofing. The default CentOS setting is
2008 Aug 20
3
[Bug 17220] New: Swfdec does not support Clipboard Hijack Attacks
http://bugs.freedesktop.org/show_bug.cgi?id=17220 Summary: Swfdec does not support Clipboard Hijack Attacks Product: swfdec Version: 0.7.x Platform: x86 (IA32) URL: http://it.slashdot.org/it/08/08/20/0029220.shtml OS/Version: Linux (All) Status: NEW Severity: trivial Priority: lowest
2013 Jan 29
2
unicorn 4.6.0pre1 - hijacking support!
Installing from RubyGems.org: gem install --pre unicorn >From db919d18e01f6b2339915cbd057fba9dc040988b Mon Sep 17 00:00:00 2001 From: Eric Wong <normalperson at yhbt.net> Date: Tue, 29 Jan 2013 21:02:55 +0000 Subject: [PATCH] unicorn 4.6.0pre1 - hijacking support This pre-release adds hijacking support for Rack 1.5 users. See Rack documentation for more information about hijacking.
2008 May 15
1
"possible hijacking of X11-forwarded connections" bug has not been fixed completely
leanneHi OpenSSH team, I am still able to reproduce this problem with openssh50 code both on hpux. Seems like OpenSSH didn't fix this problem completely. how to reproduce: 1. root at sshpa4# uname -aHP-UX sshpa4 B.11.23 U 9000/800 3267743753 unlimited-user license 2. sshd_config X11Forwarding yesX11DisplayOffset 10X11UseLocalhost no // must not use "yes" to bind
2008 May 16
4
[Bug 1464] New: "possible hijacking of X11-forwarded connections" bug has not been fixed completely
https://bugzilla.mindrot.org/show_bug.cgi?id=1464 Summary: "possible hijacking of X11-forwarded connections" bug has not been fixed completely Classification: Unclassified Product: Portable OpenSSH Version: 5.0p1 Platform: Other OS/Version: HP-UX Status: NEW Severity: security
2019 Dec 06
0
VPN connections subject to hijack attack
<https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/> This affects all VPNs and is a consequence of using "loose" reverse path filtering for anti-spoofing. The default CentOS setting is strict filtering but you may have changed this to loose for some unusual routing situations. Check that the value of
2006 Mar 01
0
Configuration call hijack for users in a hunting group ?
Hello list We've installed asterisk@home 2.6 at the office :) I'm trying to set call hijacking for users The way this should work is this: When call comes in, a user would dial some phone code (like *8# - what we had in the old 1.0.9 setup) and pick up the call. How can I do this for the 2.6 setup ? Can it be done from the AMP web managment portal ? Our setup uses the zapata.conf file
2019 Feb 20
2
Bug in print.default: dispatches to global show instead of methods::show
This is related to a problem that was fixed in 2015 https://github.com/wch/r-source/commit/38ea40dcd0353af16d35296ee621338c49ae48c9 The problem then was that auto-printing by typing an object to the console would search for show() in the globalenv instead of in the methods namespace. The problem I would like to report is that it seems that when an S4 object is printed with print(), a similar
2015 Sep 02
3
llvm cfi
Ask a simple question : I svn checkout compiler-rt in llvm/project. And I compile llvm through cmake. How can I make for all those testing files? make test? - mudongliang 2015-09-02 0:58 GMT+08:00 Kostya Serebryany <kcc at google.com>: > Take a look at > > clang.llvm.org/docs/ControlFlowIntegrityDesign.html > clang.llvm.org/docs/ControlFlowIntegrity.html > > And the
2004 May 17
1
Mail Server in the DMZ question
Been trying to puzzle through a firewall layout here involving E-Mail. Would have thought this was a more common kind of scenario, but I haven't been able to Google me up an answer to this one. At present I have an SMTP server (Postfix) in my DMZ that is simply re-routing mail into my secure network. This is a less than optimal setup simply due to having to allow traffic from the DMZ
2004 Aug 06
1
Icecast2 Beta 1 hijacks CPU
I'm running Icecast 2 Beta 1 which satisfies my needs - high quality audio serving @ reasonably low bitrates. The problem is however that it tends to hog the CPU resources after having run for like a day/day and a half. Source and client connections fail when this happens. I'm using psmon to monitor icecast (respawn when it dies or kill/respawn when it starts to eat CPU). I use
2010 Mar 24
1
This is a test, hijack this
Hello Asterisk, This is only a test, because I can't start new thread in this list... -- Best regards, Gergo mailto:csibra at gmail.com
2007 Apr 13
2
Is JavaScript JSON Hijacking problems present/considered in Prototype's coming release?
I sort of let things loose on Prototype''s growth for awhile - yet, as the article (found here: http://webreflection.blogspot.com/2007/04/are-130-byte-enought-to-solve.html) came before me, the question arose: ''is the issue considered in Prototype?'' I couldn''t find a bug regarding it: the one in German isn''t counted. ) So I roll it in here. Please
2015 Mar 19
3
[LLVMdev] How will OrcJIT guarantee thread-safety when a function is asked to be re generated?
Hi Sanjoy, > You need the hijack-return-pc approach *in addition* to a call-site > patching approach. Modifying the return PC lets you guarantee that > nothing will *return* into the old generated code. To guarantee that > nothing will *call* into it either you could use a double indirection > (all calls go through a trampoline) or patchpoints. You need to hijack the return
2004 Aug 06
0
Icecast2 Beta 1 hijacks CPU
Detailied instructions.... Not a very simple task I'm afraid. I'll try anyway. For starters I've only compiled libogg (CVS snapshots), libvorbis (CVS snapshots) and icecast beta 1 (from icecast.org's Download page). I didn't bother with ices, libshout, etc. since I use Winamp icw Oddcast to provide the source for icecast. All compiled using: ./configure