lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <412c15c5ee0292f471f1d11fbf539a7e.squirrel@gameframe.net> Date: Sat, 9 Jul 2011 16:51:49 +0300 From: nix@...roxylists.com To: "Mango" <h@...r.se> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: phpMyAdmin 3.x preg_replace RCE POC > I'm flooded with requests for a POC and many doubt that these > vulnerabilities are exploitable. And since this vulnerability is > rather technically interesting I believe many could learn from it. > > http://ha.xxor.se/2011/07/phpmyadmin-3x-pregreplace-rce-poc.html > Could you fix that font on your site? Very small light green font on black background. It's horrible. I did not even bothered to read it in full due to that. > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/