lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070416005859.13294.qmail@securityfocus.com> Date: 16 Apr 2007 00:58:59 -0000 From: stuart_smith@...il.remove.com To: bugtraq@...urityfocus.com Subject: Re: phpMyChat-0.14.5 You appear to have reported 4 non existent issues in a row, in this case the variable you are trying to exploit is defined at the very top of the script. It's the same with the Maian scripts you are reporting. They clearly have the following at the top of the script. $path_to_folder = dirname(__FILE__).'/'; I suggest your time would be better spent actually learning the language before you attempt to report any sort of security exploits.