Hello,
Is there an PHP exploit in Potato?
I really don't know, below message in Dshield mailing
lists claims so:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I finally got my hands on an exploit that will provide a
remote shell (not root) for php < 4.0.6. It claims to exploit
the fol
Hello,
Is there an PHP exploit in Potato?
I really don't know, below message in Dshield mailing
lists claims so:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
>
> I finally got my hands on an exploit that will provide a
> remote shell (not root) for php < 4.0.6. It claims to explo
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
unsubscribe [EMAIL PROTECTED]
Title: ììí ì¬ë ì¥ë¯¸ 100ì¡ì´ë¡ ë§ëì¸ì
<ì ë³´íµì ë§ì´ì©ì´ì§ ë° ì ë³´ë³´í¸ì ê´í ë²ë¥ ì ìê±° íì>
íë½ìì´ ë©ì¼ì ë³´ë´ì ì£ì¡í©ëë¤. ì´ ë©ì¼ì ì¹ìí ëì¤ ê³µê°ë ëì ë©ì¼ì ë³´ê³ ë³´ë´ë리
unsubscribe [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
also sprach Jerry Lynde <[EMAIL PROTECTED]> [2002.02.25.2218 +0100]:
> I just wouldn't suggest anyone use BIND is the same sense that I wouldn't
> suggest they
> ride a Harley naked on snow-packed icy roads... something bad's bound to
> happen...
you are asking for it... i would consider my BIND
Title: ¿µ¿øÇÑ »ç¶û Àå¹Ì 100¼ÛÀÌ·Î ¸¸µå¼¼¿ä
<Á¤º¸Åë½Å¸ÁÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ ÀǰŠǥ½Ã>
Çã¶ô¾øÀÌ ¸ÞÀÏÀ» º¸³»¼ Á˼ÛÇÕ´Ï´Ù. ÀÌ ¸ÞÀÏÀº À¥¼ÇÎ µµÁß °ø°³µÈ ´ÔÀÇ ¸ÞÀÏÀ» º¸°í º¸³»µå¸®´Â ±¤°íÀÔ´Ï´Ù.
°áÄÚ, ¸ÞÀÏÁÖ¼ÒÀÌ¿Ü ´Ô¿¡ ´ëÇÑ ¾î¶² Á¤º¸µµ °¡Áö°í ÀÖÁö ¾Ê½À´Ï´Ù
also sprach Jerry Lynde <[EMAIL PROTECTED]> [2002.02.25.2218 +0100]:
> I just wouldn't suggest anyone use BIND is the same sense that I wouldn't
> suggest they
> ride a Harley naked on snow-packed icy roads... something bad's bound to
> happen...
you are asking for it... i would consider my BIN
Quoting Sven Hoexter ([EMAIL PROTECTED]):
> You forgot to mention that you can chroot bind since a 8.x release.
Yup ! :)
> The chroot is not the non plus ultra solution but it throws a few more stones
> in the way of the script kiddies.
..and it is even quite maintainable in a chroot, when runn
Sven Hoexter <[EMAIL PROTECTED]> writes:
[snip]
>> I'm still under the impression that it's quite possible to do a
>> reasonably secure bind install. Bind9 has some nice security-related
>> features, and a completely rewritten codebase (as opposed to bind8). I'm
>> not sure what insecurities you'd
On Mon, Feb 25, 2002 at 10:59:20PM +0100, Robert van der Meulen wrote:
> Quoting Jerry Lynde ([EMAIL PROTECTED]):
> > At 12:15 PM 2/25/2002, Robert wrote:
Hi,
> > I just wouldn't suggest anyone use BIND is the same sense that I wouldn't
> > suggest they
> > ride a Harley naked on snow-packed icy
Quoting Sven Hoexter ([EMAIL PROTECTED]):
> You forgot to mention that you can chroot bind since a 8.x release.
Yup ! :)
> The chroot is not the non plus ultra solution but it throws a few more stones
> in the way of the script kiddies.
..and it is even quite maintainable in a chroot, when run
Sven Hoexter <[EMAIL PROTECTED]> writes:
[snip]
>> I'm still under the impression that it's quite possible to do a
>> reasonably secure bind install. Bind9 has some nice security-related
>> features, and a completely rewritten codebase (as opposed to bind8). I'm
>> not sure what insecurities you'
On Mon, Feb 25, 2002 at 10:59:20PM +0100, Robert van der Meulen wrote:
> Quoting Jerry Lynde ([EMAIL PROTECTED]):
> > At 12:15 PM 2/25/2002, Robert wrote:
Hi,
> > I just wouldn't suggest anyone use BIND is the same sense that I wouldn't
> > suggest they
> > ride a Harley naked on snow-packed ic
Hi,
> One solution which I use is this... I have both my cert.pem and
> cert.key file in in a directory... I then run the following:
>
> openssl x509 -in cert.pem -out /etc/apache/ssl.crt/server.crt
> openssl rsa -in cert.key -out /etc/apache/ssl.key/server.key
> chown root:root /etc/apache
17 matches
Mail list logo