[VIM] Fake - readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
str0ke
str0ke at milw0rm.com
Sat Mar 31 13:11:57 UTC 2007
Darkfig,
This wasn't on their site when I posted it on milw0rm. Was it a
leak'ing problem?
/str0ke
On 3/31/07, GM darkfig <gmdarkfig at gmail.com> wrote:
> readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
> Author: ThE-WoLf-KsA
> Advisory: http://www.milw0rm.com/exploits/3573
>
> The guy copied an article from SecurityReason:
> error_log() Safe Mode Bypass PHP 5.1.4 and 4.4.2
> http://securityreason.com/achievement_securityalert/41
>
> He changed the title, the author's name, the function, and that's all.
More information about the VIM
mailing list