Speaking of this vulnerability, is there a web site somewhere (like trustedsec or similar) where this vulnerability is covered in more detail? I'd really like to learn up on it, see how it is being used and how it's being treated (besides by patching/updating your bash and/or php programs).
Thanks! --- Dan /* PLUG: http://plug.org, #utah on irc.freenode.net Unsubscribe: http://plug.org/mailman/options/plug Don't fear the penguin. */
