Hi Dne Mon, 29 Jun 2009 13:39:19 +0200 Thijs Kinkhorst <[email protected]> napsal(a):
> Right, but the reporter is basing his report on the presence of log lines
> trying to exploit the original issue. Which should not be possible anymore.
No, in the log, he is using exploited config file (with some custom
code inside).
--
Michal Čihař | http://cihar.com | http://blog.cihar.com
signature.asc
Description: PGP signature

