[BlueOnyx:27026] Re: Are we safe from the new PHP exploit?

Starlite528 starlite528 at gmail.com
Sun Jun 9 15:20:18 -05 2024


Oh lol that's what I get for not paying complete attention to the article

On Sun, Jun 9, 2024, 3:17 PM Michael Stauber via Blueonyx <
blueonyx at mail.blueonyx.it> wrote:

> Hi Colin,
>
> >
> https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/
> <
> https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/
> >
> As stated here ...
>
>
> https://socradar.io/critical-rce-vulnerability-cve-2024-4577-in-php-on-windows-patch-now-available/
>
> ... this is a Windows only PHP vulnerability. So yeah: We're good.
>
> --
> With best regards
>
> Michael Stauber
> _______________________________________________
> Blueonyx mailing list
> Blueonyx at mail.blueonyx.it
> http://mail.blueonyx.it/mailman/listinfo/blueonyx
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20240609/ab38f524/attachment.html>


More information about the Blueonyx mailing list