<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Motoma</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Motoma"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Motoma"/>
		<updated>2026-05-07T05:41:01Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Top_10_2007-Malicious_File_Execution&amp;diff=21151</id>
		<title>Talk:Top 10 2007-Malicious File Execution</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Top_10_2007-Malicious_File_Execution&amp;diff=21151"/>
				<updated>2007-08-27T14:29:12Z</updated>
		
		<summary type="html">&lt;p&gt;Motoma: New page: &amp;quot;Not only does this allow evaluation of remote hostile scripts, it can be used to access local file servers (if PHP is hosted upon Windows) due to SMB support in PHP’s file system wrappe...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;quot;Not only does this allow evaluation of remote hostile scripts, it can be used to access local file servers (if PHP is hosted upon Windows) due to SMB support in PHP’s file system wrappers.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This flaw can allow access to the local file servers regardless of the operating system PHP is hosted on; actively mounted shares appear as normal file system entities, accessible through standard file operations.&lt;br /&gt;
&lt;br /&gt;
--[[User:Motoma|Motoma]] 10:29, 27 August 2007 (EDT)&lt;/div&gt;</summary>
		<author><name>Motoma</name></author>	</entry>

	</feed>