Computer Security
[EN] securityvulns.ru no-pyccku


PHP proc_open() safe_mode bypass
Published:09.12.2008
Source:
SecurityVulns ID:9490
Type:local
Threat Level:
6/10
Description:It's possible to execute any code from shared library via proc_open().
Affected:PHP : PHP 5.2
Original documentdocumentgat3way_(at)_gat3way.eu, PHP safe_mode can be bypassed via proc_open() and custom environment. (09.12.2008)
Files:Exploits PHP safe_mode bypass via proc_open()

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod