lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <43DBD061.8060208@katamail.com> Date: Sat Jan 28 20:13:52 2006 From: ascii at katamail.com (ascii) Subject: PHP5 Globals Vulnerability PHP5 Globals Vulnerability Name PHP5 Globals Vulnerability Systems Affected PHP5 (verified on 5.1.1 and 5.1.2) Severity Critical Vendor www.php.net Advisory http://www.ush.it/2006/01/25/php5-globals-vulnerability/ Author Francesco "aScii" Ongaro (ascii at katamail . com) Date 20060125 With ?GLOBALS[foobar] you can set the value of the un-initialized $foobar variable. Advisory released on 20060128: PHP5 Globals Vulnerability http://www.ush.it/2006/01/25/php5-globals-vulnerability/