dbmopen() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
dbase_open() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
filepro() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
filepro_rowcount() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
filepro_retrieve() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
ifx_*() | sql_safe_mode restrictions, (!= safe mode) |
ingres_*() | sql_safe_mode restrictions, (!= safe mode) |
mysql_*() | sql_safe_mode restrictions, (!= safe mode) |
pg_loimport() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
posix_mkfifo() | Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. |
putenv() | Obeys the safe_mode_protected_env_vars and
safe_mode_allowed_env_vars ini-directives. See also the documentation
on putenv() |
move_uploaded_file() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
chdir() | Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. |
dl() | This function is disabled in safe mode. |
backtick operator | This function is disabled in safe mode. |
shell_exec() (functional equivalent
of backticks) | This function is disabled in safe mode. |
exec() | You can only execute executables within the safe_mode_exec_dir.
For practical reasons it's currently not allowed to have
.. components in the path to the executable. |
system() | You can only execute executables within the safe_mode_exec_dir.
For practical reasons it's currently not allowed to have
.. components in the path to the executable. |
passthru() | You can only execute executables within the safe_mode_exec_dir.
For practical reasons it's currently not allowed to have
.. components in the path to the executable. |
popen() | You can only execute executables within the safe_mode_exec_dir.
For practical reasons it's currently not allowed to have
.. components in the path to the executable. |
mkdir() | Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. |
rmdir() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
rename() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. |
unlink() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. |
copy() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. (on
source and
target) |
chgrp() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
chown() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. |
chmod() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. In addition, you cannot
set the SUID, SGID and sticky bits |
touch() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. |
symlink() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. (note: only the target is
checked) |
link() | Checks whether the file(s)/directories you are
about to operate on have the same UID as the script that is being
executed. Checks whether the directory in which
you are about to operate has the same UID as the script that is being
executed. (note: only the target is
checked) |
getallheaders() | In safe mode, headers beginning with 'authorization'
(case-insensitive)
will not be returned. Warning: this is broken with the aol-server
implementation of getallheaders()! |
Any function that uses
php4/main/fopen_wrappers.c
| ?? |