If a website is running a version of php with vulnerable functions does the function have to be used in a script in order to exploit the vulnerability?
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
