[VIM] Fake - readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
GM darkfig
gmdarkfig at gmail.com
Sat Mar 31 13:06:15 UTC 2007
readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
Author: ThE-WoLf-KsA
Advisory: http://www.milw0rm.com/exploits/3573
The guy copied an article from SecurityReason:
**error_log() Safe Mode Bypass PHP 5.1.4 and 4.4.2
http://securityreason.com/achievement_securityalert/41
He changed the title, the author's name, the function, and that's all.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.attrition.org/pipermail/vim/attachments/20070331/7e6443f3/attachment.html
More information about the VIM
mailing list