[VIM] Fake - readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4

str0ke str0ke at milw0rm.com
Sat Mar 31 13:13:01 UTC 2007


No matter, different vulnerability im thinking of.

Thanks for the heads up.

/str0ke

On 3/31/07, str0ke <str0ke at milw0rm.com> wrote:
> Darkfig,
>
> This wasn't on their site when I posted it on milw0rm.  Was it a
> leak'ing problem?
>
> /str0ke
>
> On 3/31/07, GM darkfig <gmdarkfig at gmail.com> wrote:
> > readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
> > Author: ThE-WoLf-KsA
> > Advisory: http://www.milw0rm.com/exploits/3573
> >
> > The guy copied an article from SecurityReason:
> > error_log() Safe Mode Bypass PHP 5.1.4 and 4.4.2
> > http://securityreason.com/achievement_securityalert/41
> >
> > He changed the title, the author's name, the function, and that's all.
>


More information about the VIM mailing list