Mario Vilas mvi...@gmail.com wrote:
W^X applies to memory protection, completely irrelevant here.
I recommend to revisit elementary school and start to learn reading!
http://seclists.org/bugtraq/2015/Aug/8
| JFTR: current software separates code from data in virtual memory and
| uses
Posting on top because that's where the cursor happens to be is like
sh*tt*ng in your pants because that's where your *ssh*l* happens to be!
Here, let me fix this for you:
I don't expect to be taking seriously by any technical community
-Original Message-
From: Stefan Kanthak
I want to stress the point made here.
Please continue the rather childish accusations *in private*.
On 08/07/2015 08:52 AM, Frank Waarsenburg wrote:
Time to unsubscribe from Bugtraq. I follow that list to be informed
of vulnerabilities, not to get spammed by fighting ego's. Get a
life.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3329-1 secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 07, 2015
Time to unsubscribe from Bugtraq. I follow that list to be informed of
vulnerabilities, not to get spammed by fighting ego's. Get a life.
___
Frank Waarsenburg
Chief Information Security Officer
RAMÂ Infotechnology
-Original Message-
From: Steve Friedl
Am 06.08.2015 um 21:33 schrieb Stefan Kanthak:
# mount /home -o noexec
bash /home/whatever/binary and you are done
any attacker which don't know this would not come far at all
signature.asc
Description: OpenPGP digital signature
Fri, Aug 7, 2015.
2:26:54 PM.
Yes Please :-)
Thanks
cheers,
/tap
-Original Message-
From: Jakob Holderbaum h...@jakob.io
Date: Fri, 7 Aug 2015 09:13:04
To: bugtraq@securityfocus.com
Subject: Re: [FD] Mozilla extensions: a security nightmare
I want to stress the point made here.
Title: Thomson Reuters FATCA - Arbitrary File Upload
Author: Jakub Pa#322;aczy#324;ski
Date: 10. June 2015
CVE: CVE-2015-5951
Affected software:
==
All versions of Thomson Reuters FATCA below v5.2
Exploit was tested on:
==
Thomson Reuters FATCA v5.1.0.30