Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.41
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
src /
php-7.4.33 /
ext /
standard /
tests /
network /
Delete
Unzip
Name
Size
Permission
Date
Action
bindto.phpt
627
B
-rw-rw-r--
2022-10-31 11:36
bug20134.phpt
514
B
-rw-rw-r--
2022-10-31 11:36
bug41347.phpt
194
B
-rw-rw-r--
2022-10-31 11:36
bug55472.phpt
119
B
-rw-rw-r--
2022-10-31 11:36
bug64330.phpt
512
B
-rw-rw-r--
2022-10-31 11:36
bug68925.phpt
2.89
KB
-rw-rw-r--
2022-10-31 11:36
bug69523.phpt
155
B
-rw-rw-r--
2022-10-31 11:36
bug69948.phpt
487
B
-rw-rw-r--
2022-10-31 11:36
bug72071.phpt
283
B
-rw-rw-r--
2022-10-31 11:36
bug73594.phpt
753
B
-rw-rw-r--
2022-10-31 11:36
bug73594a.phpt
723
B
-rw-rw-r--
2022-10-31 11:36
bug74764.phpt
875
B
-rw-rw-r--
2022-10-31 11:36
bug76755.phpt
183
B
-rw-rw-r--
2022-10-31 11:36
bug80067.phpt
333
B
-rw-rw-r--
2022-10-31 11:36
bug81618.phpt
268
B
-rw-rw-r--
2022-10-31 11:36
closelog_basic.phpt
542
B
-rw-rw-r--
2022-10-31 11:36
fsockopen_basic.phpt
1.55
KB
-rw-rw-r--
2022-10-31 11:36
fsockopen_error.phpt
2.28
KB
-rw-rw-r--
2022-10-31 11:36
fsockopen_variation1.phpt
928
B
-rw-rw-r--
2022-10-31 11:36
fsockopen_variation2.phpt
1.06
KB
-rw-rw-r--
2022-10-31 11:36
gethostbyaddr_basic1.phpt
492
B
-rw-rw-r--
2022-10-31 11:36
gethostbyaddr_error.phpt
1.76
KB
-rw-rw-r--
2022-10-31 11:36
gethostbyname_basic001.phpt
274
B
-rw-rw-r--
2022-10-31 11:36
gethostbyname_basic003.phpt
459
B
-rw-rw-r--
2022-10-31 11:36
gethostbyname_error001.phpt
208
B
-rw-rw-r--
2022-10-31 11:36
gethostbyname_error002.phpt
205
B
-rw-rw-r--
2022-10-31 11:36
gethostbyname_error003.phpt
203
B
-rw-rw-r--
2022-10-31 11:36
gethostbyname_error004.phpt
384
B
-rw-rw-r--
2022-10-31 11:36
gethostbyname_error006.phpt
217
B
-rw-rw-r--
2022-10-31 11:36
gethostbynamel_basic1.phpt
480
B
-rw-rw-r--
2022-10-31 11:36
gethostname.phpt
323
B
-rw-rw-r--
2022-10-31 11:36
getmxrr.phpt
707
B
-rw-rw-r--
2022-10-31 11:36
getprotobyname_basic.phpt
351
B
-rw-rw-r--
2022-10-31 11:36
getprotobyname_error.phpt
337
B
-rw-rw-r--
2022-10-31 11:36
getprotobynumber_basic.phpt
360
B
-rw-rw-r--
2022-10-31 11:36
getprotobynumber_error.phpt
347
B
-rw-rw-r--
2022-10-31 11:36
http-stream.phpt
538
B
-rw-rw-r--
2022-10-31 11:36
inet.phpt
1.25
KB
-rw-rw-r--
2022-10-31 11:36
inet_ipv6.phpt
962
B
-rw-rw-r--
2022-10-31 11:36
ip.phpt
1.34
KB
-rw-rw-r--
2022-10-31 11:36
ip2long_variation2.phpt
787
B
-rw-rw-r--
2022-10-31 11:36
ip2long_variation2_x64.phpt
1.05
KB
-rw-rw-r--
2022-10-31 11:36
ip_x86_64.phpt
1.39
KB
-rw-rw-r--
2022-10-31 11:36
net_get_interfaces_001.phpt
613
B
-rw-rw-r--
2022-10-31 11:36
news.rss
1.16
KB
-rw-rw-r--
2022-10-31 11:36
setcookie.phpt
2.17
KB
-rw-rw-r--
2022-10-31 11:36
setcookie_error.phpt
1.19
KB
-rw-rw-r--
2022-10-31 11:36
shutdown.phpt
1.65
KB
-rw-rw-r--
2022-10-31 11:36
socket_bug74429.phpt
799
B
-rw-rw-r--
2022-10-31 11:36
socket_get_status_basic.phpt
543
B
-rw-rw-r--
2022-10-31 11:36
syslog_basic.phpt
589
B
-rw-rw-r--
2022-10-31 11:36
tcp4loop.phpt
785
B
-rw-rw-r--
2022-10-31 11:36
tcp6loop.phpt
1.31
KB
-rw-rw-r--
2022-10-31 11:36
udgloop.phpt
861
B
-rw-rw-r--
2022-10-31 11:36
udp4loop.phpt
647
B
-rw-rw-r--
2022-10-31 11:36
udp6loop.phpt
1.33
KB
-rw-rw-r--
2022-10-31 11:36
unixloop.phpt
949
B
-rw-rw-r--
2022-10-31 11:36
Save
Rename
--TEST-- Bug #68925 (CVE-2015-0235 – GHOST: glibc gethostbyname buffer overflow) --FILE-- <?php var_dump(gethostbyname(str_repeat("0", 2501))); var_dump(gethostbynamel(str_repeat("0", 2501))); ?> --EXPECTF-- Warning: gethostbyname(): Host name is too long, the limit is %d characters in %s%ebug68925.php on line %d string(2501) "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000" Warning: gethostbynamel(): Host name is too long, the limit is %d characters in %s%ebug68925.php on line %d bool(false)