More example of argument and shell command injections in browser invocation

computer unix debian security shell

In the previous episode, I talked about some argument and shell command injections vulnerabilities through URIs passed to browsers. Here I'm checkig some other CVEs which were registered at the same time.

Read more…

Argument and shell command injections in browser invocation

computer unix debian security shell

While reading the source of sensible-browser in order to understand how it was choosing which browser to call (and how I could tweak this choice), I found an argument injection vulnerability when handling the BROWSER environment variable. This lead me (and others) to a a few other argument and shell command injection vulnerabilities in BROWSER processing and browser invocation in general.

Read more…

Foo over SSH

Using SSH as a transport for your protocol

computer network ssh unix

A comparison of the different solutions for using SSH2 as a secured transport for protocols/services/applications.

Read more…

Terminal read-only live sharing

computer unix ssh screen

Live sharing a terminal session to another (shared) host over SSH in read-only mode.

Read more…

OpenSSH ProxyUseFdPass

computer network system ssh python

While looking at the OpenSSH ssh_config manpage, I found the ProxyUseFdpass configuration I did not know about. It's apparently not widely known or used.

Read more…

C++ synchronisations for SimGrid

computer simgrid c++ future

This is an overview of some recent additions to the SimGrid code related to actor synchronisation. It might be interesting for people using SimGrid, working on SimGrid or for people interested in generic C++ code for synchronisation or asynchronicity.

Read more…

Number of lines of code with FlameGraph

computer simgrid flamegraph

FlameGraph is used to display stack trace samples but we can ue it for other purposes as well.

Read more…

Page 1 of 5 | Previous page | Next page