lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: linux at digipix.org (Evert Daman) Subject: file inclusion (les visiteurs) > > If I'm wrong, Evert, correct me. > > I think that it is a security realted post, and blames are out of > > contest. > > I blamed the ppl trying to exploit this vulnerability, not Evert, > because > it's interessting to see, at least for me it is. thank god no-one is blaming me for this :P no. it was meant to be a warning. i found the way they found my site (using google: [29/Nov/2003:20:53:13 +0100] "GET /counter/?view=year&ypd=1 HTTP/1.1" 200 14565 "http://www.google.com.br/search?num=100&hl=pt-BR&ie=UTF-8&oe=UTF-8&q=allinu rl%3A+%3Fview%3Dyear+ypd%3D1&meta=" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)") and my post was meant to be a warning for al sites listed on the google-results of the url above. i don't know if they found vunerable sites though. the first 10 results i checked still looked normal to me :) kind regards, Evert
Powered by blists - more mailing lists