![]() Preserved Topic: PHP (3.x & 4.X) remote fileupload vulnerabilities... (Page 1 of 1) |
|
---|---|
Maniac (V) Mad Scientist From: Belgrade, Serbia |
![]() Details: http://security.e-matters.de/advisories/012002.html |
Paranoid (IV) Mad Scientist From: Omicron Persei 8 |
![]() damn my bad english, what's arbitrary code? |
Maniac (V) Mad Scientist From: 100101010011 <-- right about here |
![]() Kinda hard to explain but it basically (in this context) means not well thought out or used for convenience as opposed to real functionality. Essentially not well planned and thought about. |
Paranoid (IV) Mad Scientist From: Omicron Persei 8 |
![]() hmmmm..... |
Paranoid (IV) Inmate From: Minneapolis, MN, USA |
![]() Actually I would say bitdamaged's explanation is actually more about arbitrary in OTHER contexts. In this context it just means they can run any code they want. |
Paranoid (IV) Inmate From: Lebanon |
![]() Grumble, your english is good, but this word has many meanings in different contexts. |