Displaying 20 results from an estimated 600 matches similar to: "Other security holes in cgi program ?"
1996 Dec 06
0
phf & Bash exploit
This is probably fairly well known, I found it by accident while reading
about the 0xFF command sperator in older version of bash shell.
The newer phf cgi that comes with some versions of picasso and rembrant
have been patched for the obvious 0x0A newline escape, but can still be
escaped using 0xFF.
It takes vulnerabilites in both phf and bash for it to work.
I have tested this very
1997 Sep 28
0
[IPD] Internet Probe Droid
[Mod: while not directly related to linux security, this post of course is
approved because it provides a good summary and clear description. Please
limit the discussion on this topic to new stuff. In general posts like this
will be approved -- alex]
Automating brute force attacks with ''Expect"
balif and desslok
- Abstract -
phf,
1997 Feb 03
1
Linux rcp bug
[Mod: This is a misconfiguration of a site. nobody''s uid should not be -1 -- alex]
When playing around with rcp on Linux, we found something interesting,
that we haven''t seen mentioned on bugtraq before:
SUMMARY: Root privileges can be obtained by user nobody with uid 65535 by
exploiting a problem with /usr/bin/rcp. Many applications are running as
''nobody'',
2010 Aug 03
4
hi!!! guestion!!
I made some matlab codes...
Is there any method to perform matlab codes in R program??
--
View this message in context: http://r.789695.n4.nabble.com/hi-guestion-tp2311219p2311219.html
Sent from the R help mailing list archive at Nabble.com.
2003 Aug 08
1
Help request: merging OpenBSD Kerberos change into Portable.
Hi All.
I'm looking for some help to merge an outstanding Kerberos
credential cache change from OpenBSD into Portable. I don't know enough
about Kerberos to figure out how that change should be applied for the
non-Heimdal(?) code path.
The outstanding diff is attached.
Any volunteers?
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4
2004 May 26
0
Updated LHA package fixes security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
There is an update to LHA for CentOS 3.1
https://rhn.redhat.com/errata/RHSA-2004-178.html refers.
2012 Sep 21
0
[LLVMdev] Scheduling question (memory dependency)
Here's another data point that may be useful. [Scheduling experts,
please help! :) ]
If the two-byte bitfield is replaced by a two-byte struct (replace
"short i:8" with "short i", etc.), the scheduler properly generates a
dependency between the store and the load. For this case, a GEP is used
instead of a bitcast:
2012 Sep 20
2
[LLVMdev] Scheduling question (memory dependency)
Greetings,
I'm investigating a bug in the PowerPC back end in which a load from a
storage address is being reordered prior to a store to the same storage
address. I'm quite new to LLVM, so I would appreciate some help
understanding what I'm seeing from the dumps. I assume that some
information is missing that would represent the memory dependency, but I
don't know what form that
2004 Dec 20
1
rsync: chgrp ... Operation not permitted
Hi all,
I've installed rsync to synchronize my linux box and my PowerBook.
I have a server whose conf file looks like
[letters]
use chroot = yes
uid = www
gid = lha.utils
path = /var/hdb/letters
read only = no
list = yes
auth users = pascal,lha
secrets file = /etc/rsyncd.secret
but when the client tries to write I have:
rsync: chgrp "/file/path/here" failed: Operation not
2012 Sep 21
0
[LLVMdev] Scheduling question (memory dependency)
Hi Sergei,
Thanks for the response! We just discovered there is likely a bug
happening during post-RA list scheduling. There's an invalid successor
index in the scheduling graph that is probably supposed to be the
missing arc. Starting to investigate further now. This is recorded in
http://llvm.org/bugs/show_bug.cgi?id=13891.
Thanks,
Bill
On Fri, 2012-09-21 at 11:15 -0500, Sergei Larin
2016 Apr 27
0
DNSSEC / Security stats (forked from php thread)
I don't have a source, I'd have to dig through my browser history, but I
looked at some of these stats just last month.
Roughly 2% of the top 1000 domains in the United States had deployed
DNSSEC - which I *think* is double what it was a year ago.
Roughly 7% of ISP recursive DNS servers enforce DNSSEC.
Comcast does and Google's public DNS does. Those are the big ones that
enforce
2012 Sep 21
0
[LLVMdev] Scheduling question (memory dependency)
OK, finally found it. The AliasChain in
ScheduleDAGInstrs::buildSchedGraph is not acting as a chain for loads
and stores (the head of the chain is not being updated as they are
encountered, so dependencies aren't being added solely on the basis of
may-aliasing in some cases). Will test a patch.
On Fri, 2012-09-21 at 13:04 -0500, William J. Schmidt wrote:
> On Fri, 2012-09-21 at 11:34
2012 Sep 21
2
[LLVMdev] Scheduling question (memory dependency)
Hi Bill,
Which scheduler do you use? MI or SDNode one? In either case the problem
is likely the same, but cause might be in a different place...
The way I see it, you have an issue with the alias analyzer, not scheduler.
When scheduling DAG is constructed, AA is checked for pairs of mem accessing
objects, and if no potential interference is flagged by the AA the chain
edge is _not_ inserted.
2012 Sep 21
2
[LLVMdev] Scheduling question (memory dependency)
On Fri, 2012-09-21 at 11:34 -0500, William J. Schmidt wrote:
> Hi Sergei,
>
> Thanks for the response! We just discovered there is likely a bug
> happening during post-RA list scheduling. There's an invalid successor
> index in the scheduling graph that is probably supposed to be the
> missing arc. Starting to investigate further now. This is recorded in
>
2004 May 27
2
LHA security vulnerabilities
Dear sir;
i am using redhat 9 on a production server and i plan to migrate to centos
3.1.
the issue now is redhat 9 vulnerable to LHA package security vulnerabilities
.
and if so how can i solve this vulnerabilities till i implemment the
upgrade.
thanks in advance.
2004 Aug 06
0
hello
K2Fb4jFc4`eOyWeV|~]!5P")k:JgiZ
k;tj2X.Hs!Yg`Qo{dDRqqOKEcE
<J:DiMo]9g#"rw;);UY*8GayoN$r?g8Paxn0tb:wL'
~Nl^n7x%^
$`xi_oK?K&-[1vOWe
8xiXiR* i`C9{Xj]W_i^s!'zs(
0G ByNw,pHf&;_kb-`:c
_QRG):P.7qIgan[[M-S
vCXV)C
UdepZlk2Bk(|-DD'}O[^*}
Ru\~-
hraw~**p'4nMnG3[Is1 g3dh!s
t#
Ca $z&)KCb`_:#
ZT QwYBj"aTB/)/g;_zGjd8bsP
u;\;fxMHe#/A"Cg
2004 Apr 12
0
fwd: mail server recommendations?
Hi
I am re-sending this message to this list, because freebsd-security list
could be more suitable for my question about UID / GID settings of
Postfix virtual users accounts.
in one sentence: "If all virtual users have same UID/GID, is there some
real security risk?"
Thank You and I am sorry for my bad english
==================================
original message from freebsd-isp:
2015 Dec 24
0
Centos7 poblems with dnssec-keygen
On 12/24/2015 12:40 PM, Robert Moskowitz wrote:
> I am reading:
>
> https://www.centos.org/docs/5/html/Deployment_Guide-en-US/s1-bind-rndc.html
>
> I have bind installed and default config running. I have not applied my
> customizations yet. The first step I am taking is getting rndc.key
> created. So reading the guide I am trying to run (while logged in as
> root, and
2017 Feb 01
0
Script not running correctly as cronjob
In article <86827d81f1944333ae213f2d3f19856a at 2sic.com>,
Daniel Reich <Daniel.Reich at 2sic.com> wrote:
> Hi
>
> I have a script to resign all DNS zones every two weeks. When i run the script from bash, it works like it should. But
> when it is executed in cron not. Its starting normal as cronjob:
> Feb 1 03:00:01 xxx CROND[20116]: (root) CMD (sh
2019 Feb 13
0
DNSSEC Questions
On 2/12/19 7:26 PM, Paul R. Ganci wrote:
> Last weekend I had my DNSSEC keys expire. I discovered that they had
> expired the hard way... namely randomly websites could not be found and
> email did not get delivered. It seems that the keys were only valid for
> what I estimate was about 30 days. It is a real PITA to have update the
> keys, restart named and then update Godaddy