lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BAY23-F15CC71AC1294A69D639F62A9BA0@phx.gbl>
Date: Fri, 26 Nov 2004 06:47:15 +0000
From: "Gyan chawdhary" <gunnu45@...mail.com>
To: bugtraq@...urityfocus.com
Cc: vuln-dev@...urityfocus.com.com, da@...urityfocus.com
Subject: php 4.3.7 memory limit POC exploit
Hi all,
Attached is an old POC I had written for the php memory limit vuln. It
works
well on php 4.3.7 with 2.0.49 apache. But its not an elegant solution.
http://www.felinemenace.org/~gyan/phpnolimit.c
have fun,
Gyan
_________________________________________________________________
Choose what you want to read. Protect your mail from spam.
http://server1.msn.co.in/sp04/hotmailspamcontrol/ Win the war in 9 steps!
View attachment "phpnolimit.c" of type "text/plain" (8110 bytes)
Powered by blists - more mailing lists