PHP (CMS) Patch Exploits!

Page 2 of 2 FirstFirst 12
Results 16 to 20 of 20
  1. #16
    hoi ik ben cool Merijn is offline
    MemberRank
    Dec 2009 Join Date
    The NetherlandsLocation
    492Posts

    Re: PHP (CMS) Patch Exploits!

    Quote Originally Posted by Davidaap View Post
    Search for x-r00t-x at HF.

    That's meh =]

  2. #17
    Account Upgraded | Title Enabled! Chapo is offline
    MemberRank
    Jul 2010 Join Date
    United StatesLocation
    944Posts

    Re: PHP (CMS) Patch Exploits!

    Why would we search for x-r00t-x, cuz you call yourself a hacker? okeoke ur the best hacker ever!!!!!!!!!!!!!!!! /sacrasme

  3. #18
    Gamma Spamma Liam is offline
    MemberRank
    Dec 2011 Join Date
    Down UnderLocation
    2,946Posts

    Re: PHP (CMS) Patch Exploits!

    Why are noobs releasing, or should I say re-releaseing crap. -- I mean, come on, all you done was RIP a part of this, then re-posted it -_-

  4. #19
    Proficient Member superdaan44 is offline
    MemberRank
    Jan 2009 Join Date
    in a chest.Location
    182Posts

    Re: PHP (CMS) Patch Exploits!

    I hate this dutch discussions every time on rz about nothing. >.>
    Dudes, it's like this dutch people are here to flame eachother. eitherweis ontopic, i will test it soon.

  5. #20
    C# / Java Programmer scottstamp851 is offline
    MemberRank
    Jan 2007 Join Date
    EverywhereLocation
    504Posts

    Re: PHP (CMS) Patch Exploits!

    There's.... nothing to test man. _slams head against wall.

    Putting this in your config.php file won't do a fucking thing, the config.php file doesn't see any (unless your CMS is seriously miswritten, still, very few) GET or POST requests from a client on the site. Even if you used this on every single bit of unscrupulous data that comes into the web server, you'd fail to prevent SQL injection.

    Lern to properly code.



Page 2 of 2 FirstFirst 12

Advertisement