similar to: [0x721427d8@gmail.com: [php<=5.4.3] Parsing Bug in PHP PDO prepared statements may lead to access violation]

Displaying 20 results from an estimated 1000 matches similar to: "[0x721427d8@gmail.com: [php<=5.4.3] Parsing Bug in PHP PDO prepared statements may lead to access violation]"

2009 Aug 04
2
php-pdo
I wish to use PostgreSQL with PHP+PDO. I haven't use PDO before. I have the php-pdo package installed on my CentOS 4.7 server: # rpm -qa |grep pdo php-pdo-5.1.6-3.el4s1.10 Now when I try connect to the PostgeSQL db with this code: <?php print "PDO test<br />"; try { $db = new PDO("pgsql:host=192.168.0.180;port=5432;dbname=mydb;user=test;password=test");
2005 Jun 21
3
Bug#315071: Results to your question
Hi, See below: # getent group adm adm:x:4:root,adm,daemon And: # ls -l /var/log total 20384 -rw-r----- 1 root adm 43310 Jun 21 16:00 auth.log -rw-r----- 1 root adm 128247 Jun 19 06:47 auth.log.0 -rw-r----- 1 root adm 10318 Jun 12 06:47 auth.log.1.gz -rw-r----- 1 root adm 9508 Jun 5 06:47 auth.log.2.gz -rw-r----- 1 root adm 12475 May 29 06:47 auth.log.3.gz
2003 Sep 17
3
NEW Asterisk Security vulnerability report ...
Hello, There is a new asterisk vulnerability report at this address: http://www.securiteam.com/unixfocus/5HP0H1PB5S.html This is the second security report regarding asterisk for 8 days (http://www.securiteam.com/securitynews/5LP0720B5G.html) Both fixes was reported and fixed silently. My question is: Is it possible in the future such a security problems to be reported in this mailing list
2009 Sep 04
0
[Fwd: AST-2009-006: IAX2 Call Number Resource Exhaustion]
Hello, Just in case someone hasn't upgraded yet, and is using IAX2. -------- Original Message -------- Subject: AST-2009-006: IAX2 Call Number Resource Exhaustion Date: Thu, 03 Sep 2009 17:47:35 -0500 From: Asterisk Security Team <security at asterisk.org> To: bugtraq at securityfocus.com Asterisk Project Security Advisory - AST-2009-006
2004 Apr 14
0
FYI re: "FreeBSD ECE flag ipfw protection bypass"
Several people have noticed that SecuriTeam.com is reporting a "FreeBSD ECE flag ipfw protection bypass" exploit. In an effort to save time, let me say this publicly: SecuriTeam.com is three years out of date. This problem was fixed in FreeBSD 3.5-STABLE and 4.2-STABLE in January 2001, and reported in Security Advisory FreeBSD-SA-01:08. Colin Percival
2003 Sep 09
3
Asterisk Security vulnerability report
Hello, today I found this security report regarding Asterisk SIP Security. http://www.securiteam.com/securitynews/5LP0720B5G.html Maybe It could help somebody who isn't using a newer than 15th of August cvs version. Best regards Lubo
2001 Dec 29
2
reversing the roles of ssh and sshd
I have a box behind a firewall that I'd like to administer. The firewall allows outgoing connections, but blocks all incoming connection requests. Thus, behind the firewall I can ssh out to my server, but I can't do the reverse. I found Sebastian Krahmer's OpenSSH Reverse [1] which looks very promising, but it is a few revisions behind. I was wondering if anyone has considered
2010 Mar 01
1
CentOS 4.8 - PHP Version 5.1.6 and SQLite
I wish to use the SQLite extensions for php but the version I updated to with yum update (see above) was compiled '--without-sqlite'. I could sure use some help getting these extensions enabled. As I am unfamiliar with OOP the references to PDO on the web have been meaningless to me. Furthermore, a trip to the local book store today (Barnes & Noble) revealed no php books that
2013 Jul 13
0
CentOS-announce Digest, Vol 101, Issue 9
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 Oct 30
0
disable ZTS in php
on certain non-linux systems like MacOS i?ll run into a problem with the standard version of iconv in php. To leave it out i use the ?without-iconv directive. Maybe give that a shot with maintainer-zts. ? Jeremy > On Oct 30, 2015, at 6:44 AM, Tim Dunphy <bluethundr at gmail.com> wrote: > > Hey guys, > > I'm trying to disable ZTS in php, because an application we
2015 Oct 30
0
disable ZTS in php
This is really wrong way to do this. Install yum-utils and use yumdownloader --source package-name to get rhel version of package. Then modify spec file and recompile. Eero Hey guys, I'm trying to disable ZTS in php, because an application we need (AppDynamics) is not compatible with it. So I tried compiling php with the following flags: php -i | grep configure Configure Command =>
2015 Oct 30
0
disable ZTS in php
I think command name is yum-downloader. Then modify spec and rpmbuild -ba specname.spec You need also modify version number a bit. Rebuilding is a bit issue as you need to recompile as security patches come out .. Eero 30.10.2015 6.04 ip. "Tim Dunphy" <bluethundr at gmail.com> kirjoitti: > Yeah Erro, ok you have a point. I'll do that. Thanks! > > On Fri, Oct 30,
2006 Jul 20
1
SQLite with PHP5 problem
Has anyone ever installed PHP5 with SQLiteDatabase class support in CentOS 4.3? I have to run a program with this class for a core feature. But unfortunately, both the php 5.0.4 package in centosplus and a SRPM build from FC5 will not work with this class. With the error "undefined class SQLiteDatabase"! And there *IS* the "pdo_sqlite.so" extension in my php.d/pdo.ini file, as
2015 Oct 30
2
disable ZTS in php
Yeah Erro, ok you have a point. I'll do that. Thanks! On Fri, Oct 30, 2015 at 11:40 AM, Eero Volotinen <eero.volotinen at iki.fi> wrote: > This is really wrong way to do this. Install yum-utils and use > yumdownloader --source package-name to get rhel version of package. Then > modify spec file and recompile. > > Eero > Hey guys, > > I'm trying to disable
2015 Oct 30
4
disable ZTS in php
Hey guys, I'm trying to disable ZTS in php, because an application we need (AppDynamics) is not compatible with it. So I tried compiling php with the following flags: php -i | grep configure Configure Command => './configure' '--with-apxs2=/opt/apache2/bin/apxs' '--with-zlib=/usr' '--prefix=/opt/php-5.6.8' '--with-libdir=lib64'
2009 Oct 06
1
[patch] PXE-On-A-Disk: etherboot2ethersel.pl patched for etherboot-5.4.3+dfgs
PXE-On-A-Disk from (ftp://ftp.scyld.com/private/jlehan/pxe-on-a-disk.html) was posted on syslinux mailing list: http://syslinux.zytor.com/archives/2005-December/006222.html. It is being mentioned by syslinux wiki, or some other documentation of syslinux that I currently can't find. I tried etherboot2ethersel.pl from PXE-On-A-Disk (ftp://ftp.scyld.com/private/jlehan/pxe-on-a-disk.html)
2012 Jun 28
0
CentOS-announce Digest, Vol 88, Issue 17
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2014 Nov 01
0
CentOS-announce Digest, Vol 117, Issue 1
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2012 May 08
0
CentOS-announce Digest, Vol 87, Issue 4
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2006 Mar 05
0
Converted tattle.pl to ruby - anyone want to be a tester?
The basic idea of tattle (http://www.securiteam.com/tools/5JP0520G0Q.html) is that it will go through your /var/logs/messages to find brute force attack attempts on your machine via ssh. It then looks up the abuse records and emails the network owners about the attack. It worked well until the log format changed a little when I updated last and it broke. So, as an exercise in learning ruby and