Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in
/afs/ir.stanford.edu/users/v/i/vijoy/cgi-bin/wedwik/pmwiki.php on line
741
Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in
/afs/ir.stanford.edu/users/v/i/vijoy/cgi-bin/wedwik/pmwiki.php on line
742
Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in
/afs/ir.stanford.edu/users/v/i/vijoy/cgi-bin/wedwik/pmwiki.php on line
745
Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in
/afs/ir.stanford.edu/users/v/i/vijoy/cgi-bin/wedwik/pmwiki.php on line
753
Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in
/afs/ir.stanford.edu/users/v/i/vijoy/cgi-bin/wedwik/pmwiki.php on line
757
Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in
/afs/ir.stanford.edu/users/v/i/vijoy/cgi-bin/wedwik/pmwiki.php on line
772
Distributed Pages:
Cookbook Pages
What about the botnet security advisory at http://isc.sans.org/diary.php?storyid=1672?
Sites that are running with PHP's register_globals setting set to "On" and versions of PmWiki prior to 2.1.21 may be vulnerable to a botnet exploit that is taking advantage of a bug in PHP. The vulnerability can be closed by turning register_globals off, upgrading to PmWiki 2.1.21 or later, or upgrading to PHP versions 4.4.3 or 5.1.4. In addition, there is a test at PmWiki:SiteAnalyzer that can be used to determine if your site is vulnerable.