Re: @(#)Mordred Labs advisory - PHP for Win32: buffer overflow in openlog() function
[
Date Prev
][
Date Next
][
Thread Prev
][
Thread Next
][
Date Index
][
Thread Index
]
To
: <
sir.mordred@hushmail.com
>
Subject
: Re: @(#)Mordred Labs advisory - PHP for Win32: buffer overflow in openlog() function
From
: "Jason Brooke" <
jason@ausgamers.com
>
Date
: Fri, 28 Mar 2003 07:29:03 +1000
References
: <
200303271553.h2RFrtMt003734@mailserver3.hushmail.com
>
> III. Workaround > > Not available at the time of writing. in php.ini: disable_functions = openlog
References
:
@(#)Mordred Labs advisory - PHP for Win32: buffer overflow in openlog() function
From:
sir.mordred
Prev by Date:
Problems with Snort-1.9.1
Next by Date:
PostNuke Sensitive Information Disclosure
Previous by thread:
@(#)Mordred Labs advisory - PHP for Win32: buffer overflow in openlog() function
Next by thread:
[SCSA-013] Cross Site Scripting vulnerability in testcgi.exe
Index(es):
Date
Thread
[Index of Archives]
[Linux Security]
[Netfilter]
[PHP]
[Yosemite News]
[Linux Kernel]