[Mimedefang] OT: Don't let this happen to you
Jan Pieter Cornet
johnpc at xs4all.nl
Wed Feb 15 18:43:08 EST 2006
On Wed, Feb 15, 2006 at 05:13:27PM -0600, Ben Kamen wrote:
> Speaking of which, I saw these in my logs today...
>
> "POST /xmlrpc.php HTTP/1.1" 500 256
Likely looking for versions not patched against this:
http://b2evolution.net/news/2005/08/31/fix_for_xml_rpc_vulnerability_again_1
I'll have to agree with David on PHP: Horrible Programming.
It's the Public Hackers Paradise.
Next to mail(), my favorite gripe about it is: require($url)
--
#!perl -wpl # mmfppfmpmmpp mmpffm <pmmppfmfpppppfmmmf at fpffmm4mmmpmfpmf.ppppmf>
$p=3-2*/[^\W\dmpf_]/i;s.[a-z]{$p}.vec($f=join('',$p-1?chr(sub{$_[0]*9+$_[1]*3+
$_[2]}->(map{/p|f/i+/f/i}split//,$&)+97):qw(m p f)[map{((ord$&)%32-1)/$_%3}(9,
3,1)]),5,1)='`'lt$&;$f.eig; # Jan-Pieter Cornet
More information about the MIMEDefang
mailing list