Server IP : 85.214.239.14 / Your IP : 52.15.209.178 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/2/task/2/root/proc/3/root/proc/3/root/usr/share/doc/php8.2-common/ |
Upload File : |
The Debian stable security team does not provide security support for certain configurations known to be inherently insecure. This includes the interpreter itself, extensions, and user scripts written in the PHP language. Most specifically, but not exclusively, the security team will not provide support for the following. * Security issues which are caused by careless programming, such as: - extracting a tar file without first checking the contents; - using unserialize() on untrusted data; - relying on a specific value of short_open_tag. * Vulnerabilities involving any kind of open_basedir violation, as this feature is not considered a security model either by us or by PHP upstream. * Any "works as expected" vulnerabilities, such as "user can cause PHP to crash by writing a malicious PHP script", unless such vulnerabilities involve some kind of higher-level DoS or privilege escalation that would not otherwise be available. PHP upstream has published a statement regarding their view on security and the PHP interpreter: http://www.php.net/security-note.php