[Mimedefang] OT: Don't let this happen to you

Jan Pieter Cornet johnpc at xs4all.nl
Wed Feb 15 18:43:08 EST 2006


On Wed, Feb 15, 2006 at 05:13:27PM -0600, Ben Kamen wrote:
> Speaking of which, I saw these in my logs today...
> 
> "POST /xmlrpc.php HTTP/1.1" 500 256

Likely looking for versions not patched against this:
http://b2evolution.net/news/2005/08/31/fix_for_xml_rpc_vulnerability_again_1

I'll have to agree with David on PHP: Horrible Programming.
It's the Public Hackers Paradise.

Next to mail(), my favorite gripe about it is: require($url)

-- 
#!perl -wpl # mmfppfmpmmpp mmpffm <pmmppfmfpppppfmmmf at fpffmm4mmmpmfpmf.ppppmf>
$p=3-2*/[^\W\dmpf_]/i;s.[a-z]{$p}.vec($f=join('',$p-1?chr(sub{$_[0]*9+$_[1]*3+
$_[2]}->(map{/p|f/i+/f/i}split//,$&)+97):qw(m p f)[map{((ord$&)%32-1)/$_%3}(9,
3,1)]),5,1)='`'lt$&;$f.eig;                                # Jan-Pieter Cornet



More information about the MIMEDefang mailing list