Subject: | Code vulnerable to RFI and LFI at... |
Summary: | Package rating comment |
Messages: | 2 |
Author: | Velimir Majstorov |
Date: | 2017-07-19 08:12:23 |
|
|
|
Velimir Majstorov rated this package as follows:
Utility: | Sufficient |
Consistency: | Not sure |
Examples: | Bad |
|
 Velimir Majstorov - 2017-07-19 08:12:23
Code vulnerable to RFI and LFI at first sight i didnt look further :)
 Devin Gaul - 2017-07-21 00:41:18 - In reply to message 1 from Velimir Majstorov
And how would I go about remedying this? At first thought I could use a $_SERVER['HTTP_REFERER'] check but that doesn't seem too reliable..
|