I didn't even think of that one. Thanks, going to remember it for the future On Sep 8, 2013 2:01 PM, "Jim Halfpenny" <jim.halfpe...@gmail.com> wrote: > > In short no. Take a look at file inclusion vulnerabilities. > > http://en.m.wikipedia.org/wiki/File_inclusion_vulnerability > > Regards > Jim > > On 8 Sep 2013 04:40, "Sean McCormick" <sean.m.mccorm...@gmail.com> wrote: >> >> If a website is running a version of php with vulnerable functions does the function have to be used in a script in order to exploit the vulnerability? >> >> >> _______________________________________________ >> Pauldotcom mailing list >> Pauldotcom@mail.pauldotcom.com >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > > > _______________________________________________ > Pauldotcom mailing list > Pauldotcom@mail.pauldotcom.com > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com
_______________________________________________ Pauldotcom mailing list Pauldotcom@mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com