lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060411145545.28677.qmail@securityfocus.com> Date: 11 Apr 2006 14:55:45 -0000 From: secfoc@...can.co.uk To: bugtraq@...urityfocus.com Subject: Re: PHPList <= 2.10.2 remote commands execution This vulnerability is caused by the PHP globals problem. http://www.hardened-php.net/globals-problem Not vulnerable: PHP 4.4.1 and up or PHP 5.1.0 and up Fix: add $GLOBALS = array(); to the top of the config file