[Mimedefang] OT: Don't let this happen to you

Jan Pieter Cornet johnpc at xs4all.nl
Wed Feb 15 18:43:08 EST 2006

On Wed, Feb 15, 2006 at 05:13:27PM -0600, Ben Kamen wrote:
> Speaking of which, I saw these in my logs today...
> "POST /xmlrpc.php HTTP/1.1" 500 256

Likely looking for versions not patched against this:

I'll have to agree with David on PHP: Horrible Programming.
It's the Public Hackers Paradise.

Next to mail(), my favorite gripe about it is: require($url)

#!perl -wpl # mmfppfmpmmpp mmpffm <pmmppfmfpppppfmmmf at fpffmm4mmmpmfpmf.ppppmf>
$_[2]}->(map{/p|f/i+/f/i}split//,$&)+97):qw(m p f)[map{((ord$&)%32-1)/$_%3}(9,
3,1)]),5,1)='`'lt$&;$f.eig;                                # Jan-Pieter Cornet

More information about the MIMEDefang mailing list