[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] ap-unlock.py - apache + php remote code exection exploit
From:       Levon Kayan <noptrix () nullsecurity ! net>
Date:       2013-10-29 22:03:33
Message-ID: A79185ED-21A1-443F-B806-B3071C4574B6 () nullsecurity ! net
[Download RAW message or body]

[Attachment #2 (multipart/signed)]


y0 list,

apache + php remote exploit, ap-unlock.py: http://nullsecurity.net/tools/exploit.html

100% working, verified and tested. 

reference: http://www.exploit-db.com/exploits/29290/


cheers,
b00btrix
--
Name: Levon 'noptrix' Kayan
E-Mail: noptrix@nullsecurity.net
GPG key: 0xDCA45D42
Key fingerprint: 250A 573C CA93 01B3 7A34  7860 4D48 E33A DCA4 5D42
Homepage: http://www.nullsecurity.net/





["signature.asc" (signature.asc)]

-----BEGIN PGP SIGNATURE-----
Comment: ><iframe src=a onload=alert('pwned') <
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=5xP4
-----END PGP SIGNATURE-----


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic