?????????? ????????? - ??????????????? - /home/.cpan/build/Storable-3.25-0/t/CVE-2015-1592.t
???????
#!/usr/bin/perl use strict; use warnings; use Test::More; use Storable qw(freeze thaw); plan tests => 1; # this original worked with the packaged exploit, but that # triggers virus scanners, so test for the behaviour instead my $x = bless \(my $y = "mt-config.cgi"), "CGITempFile"; my $frozen = freeze($x); { my $warnings = ''; local $SIG{__WARN__} = sub { $warnings .= "@_" }; thaw($frozen); like($warnings, qr/SECURITY: Movable-Type CVE-2015-1592 Storable metasploit attack/, 'Detect CVE-2015-1592'); }
| ver. 1.6 |
Github
|
.
| PHP 8.2.30 | ??????????? ?????????: 0 |
proxy
|
phpinfo
|
???????????