I didn't even think of that one. Thanks, going to remember it for the future
On Sep 8, 2013 2:01 PM, "Jim Halfpenny" <[email protected]> wrote:
>
> In short no. Take a look at file inclusion vulnerabilities.
>
> http://en.m.wikipedia.org/wiki/File_inclusion_vulnerability
>
> Regards
> Jim
>
> On 8 Sep 2013 04:40, "Sean McCormick" <[email protected]> wrote:
>>
>> If a website is running a version of php with vulnerable functions does
the function have to be used in a script in order to exploit the
vulnerability?
>>
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to