lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <42EA9CBD.3070706@hardened-php.net> Date: Fri Jul 29 22:17:12 2005 From: christopher.kunz at hardened-php.net (Christopher Kunz) Subject: PHP Command/Safemode Exploit Christopher Kunz wrote: > If you filter user input correctly, there's absolutely nothing to worry. > You might, however, want to check out the Hardening Patch for PHP > (http://www.hardened-php.net/, shameless plug) which permits include() "disallows", of course. It has been a long week, I apologize. --ck
Powered by blists - more mailing lists