-
hoi ik ben cool
Re: PHP (CMS) Patch Exploits!

Originally Posted by
Davidaap
Search for x-r00t-x at HF.
That's meh =]
-
Re: PHP (CMS) Patch Exploits!
Why would we search for x-r00t-x, cuz you call yourself a hacker? okeoke ur the best hacker ever!!!!!!!!!!!!!!!! /sacrasme
-
Re: PHP (CMS) Patch Exploits!
Why are noobs releasing, or should I say re-releaseing crap. -- I mean, come on, all you done was RIP a part of this, then re-posted it -_-
-
Proficient Member
Re: PHP (CMS) Patch Exploits!
I hate this dutch discussions every time on rz about nothing. >.>
Dudes, it's like this dutch people are here to flame eachother. eitherweis ontopic, i will test it soon.
-
Re: PHP (CMS) Patch Exploits!
There's.... nothing to test man. _slams head against wall.
Putting this in your config.php file won't do a fucking thing, the config.php file doesn't see any (unless your CMS is seriously miswritten, still, very few) GET or POST requests from a client on the site. Even if you used this on every single bit of unscrupulous data that comes into the web server, you'd fail to prevent SQL injection.
Lern to properly code.