lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031120203603.6252.qmail@web41713.mail.yahoo.com> From: alf1num3rik at yahoo.com (Stephen) Subject: Remote root exploit for mod_gzip (with debug_mode) Hi, 1st) this not ROOT Exploit !!! 2nd) this exploit is public on bugtraq and k-otic, so why repost ? http://www.k-otik.net/exploits/11.20.mod_gzip.c.php http://www.securityfocus.com/archive/1/345094 Regards. Pet --- Alexander Antipov <pk95@...dex.ru> wrote: > Hi! > > / Single mode: > \ > / [crz@...cksand crz]$ ./85mod_gzip -t 0 -h > localhost __________________________________ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/