I didn't even think of that one. Thanks, going to remember it for the future
On Sep 8, 2013 2:01 PM, "Jim Halfpenny" <jim.halfpe...@gmail.com> wrote:
>
> In short no. Take a look at file inclusion vulnerabilities.
>
> http://en.m.wikipedia.org/wiki/File_inclusion_vulnerability
>
> Regards
> Jim
>
> On 8 Sep 2013 04:40, "Sean McCormick" <sean.m.mccorm...@gmail.com> wrote:
>>
>> If a website is running a version of php with vulnerable functions does
the function have to be used in a script in order to exploit the
vulnerability?
>>
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> Pauldotcom@mail.pauldotcom.com
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
>
> _______________________________________________
> Pauldotcom mailing list
> Pauldotcom@mail.pauldotcom.com
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
Pauldotcom@mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to