Author: JT Smith
Category:
- Linux
Author: JT Smith
Category:
Author: JT Smith
Author: JT Smith
Category:
Author: JT Smith
Category:
Author: JT Smith
Category:
Author: JT Smith
Although not destructive, the virus program is inconveniencing
many webmasters as it hogs resources while searching for new
servers to infect.” Here’s more from ZD Net.
Category:
Author: JT Smith
Author: JT Smith
Category:
Author: JT Smith
Author: JT Smith
1) It is possible to specify PHP directives on a per-directory basis
under apache. In the vulnerable versions of PHP, a remote attacker
could craft an HTTP request that would cause the next page to be
served with the wrong values for these directives.
2) Even though PHP is installed, it can be deactivated and activated
via a directive like “engine=off” or “engine=on”. This directive can
be used on a per-directory basis or even per virtual host. Vulnerable
versions of the php4 module could “leak” the “engine=off” setting to
other virtual hosts on the same machine, effectively disabling PHP
for those hosts and resulting in PHP source code being sent to the
client instead of being executed on the server.”
Category: