[VIM] Fake - readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4

GM darkfig gmdarkfig at gmail.com
Sat Mar 31 13:06:15 UTC 2007


readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
Author: ThE-WoLf-KsA
Advisory: http://www.milw0rm.com/exploits/3573

The guy copied an article from SecurityReason:
**error_log() Safe Mode Bypass PHP 5.1.4 and 4.4.2
http://securityreason.com/achievement_securityalert/41

He changed the title, the author's name, the function, and that's all.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.attrition.org/pipermail/vim/attachments/20070331/7e6443f3/attachment.html 


More information about the VIM mailing list