[VIM] Fake - readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
str0ke
str0ke at milw0rm.com
Sat Mar 31 13:13:01 UTC 2007
No matter, different vulnerability im thinking of.
Thanks for the heads up.
/str0ke
On 3/31/07, str0ke <str0ke at milw0rm.com> wrote:
> Darkfig,
>
> This wasn't on their site when I posted it on milw0rm. Was it a
> leak'ing problem?
>
> /str0ke
>
> On 3/31/07, GM darkfig <gmdarkfig at gmail.com> wrote:
> > readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
> > Author: ThE-WoLf-KsA
> > Advisory: http://www.milw0rm.com/exploits/3573
> >
> > The guy copied an article from SecurityReason:
> > error_log() Safe Mode Bypass PHP 5.1.4 and 4.4.2
> > http://securityreason.com/achievement_securityalert/41
> >
> > He changed the title, the author's name, the function, and that's all.
>
More information about the VIM
mailing list