<?xml version='1.0' encoding='UTF-8'?>
<rss version='2.0'>
	<channel>
		<title>cotonti.com : Serious PHP security leak</title>
		<link>https://www.cotonti.com</link>
		<description>Last topic posts</description>
		<generator>Cotonti</generator>
		<language>en</language>
		<pubDate>Tue, 07 Apr 2026 18:03:25 -0000</pubDate>

		<item>
			<title>Eugene</title>
			<description><![CDATA[<p>
	It would be great to list such (security) recommendations somewhere to make (at least) admins|developpers aware...</p>
<p>
	 </p>
]]></description>
			<pubDate>Sat, 05 May 2012 06:27:29 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/forums?m=posts&q=6909&d=0#post34199]]></link>
		</item>
		<item>
			<title>Trustmaster</title>
			<description><![CDATA[<p>
	Thanks for sharing!</p>
<p>
	I generally avoid hosts running PHP in CGI mode and recommend others to do the same. Not just for security reasons, CGI mode works significantly slower than FastCGI or Apache module.</p>
]]></description>
			<pubDate>Fri, 04 May 2012 17:38:51 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/forums?m=posts&q=6909&d=0#post34193]]></link>
		</item>
		<item>
			<title>ez</title>
			<description><![CDATA[<p>
	Apparently PHP has a serious leak which has not been patched YET.</p>
<p>
	Please check your own sites for this:</p>
<p>
	More info: <a href="http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/" rel="nofollow">http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/</a></p>
<p>
	Hopefully this will help somebody... :)</p>
]]></description>
			<pubDate>Fri, 04 May 2012 10:07:39 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/forums?m=posts&q=6909&d=0#post34192]]></link>
		</item>
	</channel>
</rss>