[VIM] Fake - readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
str0ke at milw0rm.com
Sat Mar 31 13:13:01 UTC 2007
No matter, different vulnerability im thinking of.
Thanks for the heads up.
On 3/31/07, str0ke <str0ke at milw0rm.com> wrote:
> This wasn't on their site when I posted it on milw0rm. Was it a
> leak'ing problem?
> On 3/31/07, GM darkfig <gmdarkfig at gmail.com> wrote:
> > readfile() Safe Mode Bypass PHP 5.2.1/ 5.1.6 / 4.4.4
> > Author: ThE-WoLf-KsA
> > Advisory: http://www.milw0rm.com/exploits/3573
> > The guy copied an article from SecurityReason:
> > error_log() Safe Mode Bypass PHP 5.1.4 and 4.4.2
> > http://securityreason.com/achievement_securityalert/41
> > He changed the title, the author's name, the function, and that's all.
More information about the VIM