lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CACRQBjDETYnnw54HCm5bL6+TxqNGX99nC7e_SO7ec7Zg40XpeQ@mail.gmail.com> Date: Sat, 9 Jul 2011 19:38:53 +0200 From: Mango <h@...r.se> To: nix@...roxylists.com Cc: full-disclosure@...ts.grok.org.uk Subject: Re: phpMyAdmin 3.x preg_replace RCE POC Your loss... But what do you suggest I'd change it to? /Mango 2011/7/9 <nix@...roxylists.com>: >> I'm flooded with requests for a POC and many doubt that these >> vulnerabilities are exploitable. And since this vulnerability is >> rather technically interesting I believe many could learn from it. >> >> http://ha.xxor.se/2011/07/phpmyadmin-3x-pregreplace-rce-poc.html >> > > Could you fix that font on your site? Very small light green font on black > background. It's horrible. I did not even bothered to read it in full due > to that. > >> _______________________________________________ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> Hosted and sponsored by Secunia - http://secunia.com/ >> > > > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/