Cette action est irreversible, confirmez la suppression du commentaire ?
Signaler le commentaire
Veuillez sélectionner un problème
Nudité
Violence
Harcèlement
Fraude
Vente illégale
Discours haineux
Terrorisme
Autre
Rakotomandimby Mihamina
On Tue, 28 Sep 2004 19:22:15 +0200, wrote:
Bonjour,
Bonjour
Existe t'il une faille
la faille c'est de poster au mauvais endroit... -- ASPO Infogérance - http://aspo.rktmb.org/activites/infogerance Unofficial FAQ fcolc - http://faq.fcolc.eu.org/ Linux User Group sur Orléans et alentours. Tél: + 33 2 38 76 43 65 (France)
On Tue, 28 Sep 2004 19:22:15 +0200, LinuX@SeB wrote:
Bonjour,
Bonjour
Existe t'il une faille
la faille c'est de poster au mauvais endroit...
--
ASPO Infogérance - http://aspo.rktmb.org/activites/infogerance
Unofficial FAQ fcolc - http://faq.fcolc.eu.org/
Linux User Group sur Orléans et alentours.
Tél: + 33 2 38 76 43 65 (France)
la faille c'est de poster au mauvais endroit... -- ASPO Infogérance - http://aspo.rktmb.org/activites/infogerance Unofficial FAQ fcolc - http://faq.fcolc.eu.org/ Linux User Group sur Orléans et alentours. Tél: + 33 2 38 76 43 65 (France)
Laurent LABAT
Existe t'il une faille
A ma connaissance, rien n'est passe sur bugtraq a ce propos. Les derniers petits "soucis" remontent au 17/09/04
========================================================= Title: php(super)info(). Affected: Php <= 5.0.1 Not Affected: it seems Php <= 4.1.2 Vulnerability Type: Exposure of sensitive informations Vendor Status: Fix released on cvs.php.net
==Summary:
Bad array parsing in php_variables.c could lead to show arbitrary memory content such as pieces of php code and other data. This affects all GET, POST or COOKIES variables.
Affected: Php <= 5.0.1 Not Affected: it seems none Vulnerability Type: Possible write of a downloaded file in an arbitrary location. Vendor Status: Vendor has released a fix on cvs.php.net
==Summary:
Bad array parsing in rfc1867.c could lead to overwrite $_FILES array elements.
Les deux patchs pour les deux problemes ci dessussont dispos sur cvs.php.net
-- Wizzz
Existe t'il une faille
A ma connaissance, rien n'est passe sur bugtraq a ce propos.
Les derniers petits "soucis" remontent au 17/09/04
========================================================= Title: php(super)info().
Affected: Php <= 5.0.1
Not Affected: it seems Php <= 4.1.2
Vulnerability Type: Exposure of sensitive informations
Vendor Status: Fix released on cvs.php.net
==Summary:
Bad array parsing in php_variables.c could lead to show arbitrary memory
content such as pieces of php code and other data.
This affects all GET, POST or COOKIES variables.
Affected: Php <= 5.0.1
Not Affected: it seems none
Vulnerability Type: Possible write of a downloaded file in an arbitrary
location.
Vendor Status: Vendor has released a fix on cvs.php.net
==Summary:
Bad array parsing in rfc1867.c could lead to overwrite $_FILES array
elements.
Les deux patchs pour les deux problemes ci dessussont dispos sur cvs.php.net
A ma connaissance, rien n'est passe sur bugtraq a ce propos. Les derniers petits "soucis" remontent au 17/09/04
========================================================= Title: php(super)info(). Affected: Php <= 5.0.1 Not Affected: it seems Php <= 4.1.2 Vulnerability Type: Exposure of sensitive informations Vendor Status: Fix released on cvs.php.net
==Summary:
Bad array parsing in php_variables.c could lead to show arbitrary memory content such as pieces of php code and other data. This affects all GET, POST or COOKIES variables.
Affected: Php <= 5.0.1 Not Affected: it seems none Vulnerability Type: Possible write of a downloaded file in an arbitrary location. Vendor Status: Vendor has released a fix on cvs.php.net
==Summary:
Bad array parsing in rfc1867.c could lead to overwrite $_FILES array elements.
Les deux patchs pour les deux problemes ci dessussont dispos sur cvs.php.net
-- Wizzz
Laurent LABAT
A ma connaissance, rien n'est passe sur bugtraq a ce propos. Les derniers petits "soucis" remontent au 17/09/04