[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [Full-disclosure] ap-unlock.py - apache + php remote code exection exploit
From: Levon Kayan <noptrix () nullsecurity ! net>
Date: 2013-10-29 22:03:33
Message-ID: A79185ED-21A1-443F-B806-B3071C4574B6 () nullsecurity ! net
[Download RAW message or body]
[Attachment #2 (multipart/signed)]
y0 list,
apache + php remote exploit, ap-unlock.py: http://nullsecurity.net/tools/exploit.html
100% working, verified and tested.
reference: http://www.exploit-db.com/exploits/29290/
cheers,
b00btrix
--
Name: Levon 'noptrix' Kayan
E-Mail: noptrix@nullsecurity.net
GPG key: 0xDCA45D42
Key fingerprint: 250A 573C CA93 01B3 7A34 7860 4D48 E33A DCA4 5D42
Homepage: http://www.nullsecurity.net/
["signature.asc" (signature.asc)]
-----BEGIN PGP SIGNATURE-----
Comment: ><iframe src=a onload=alert('pwned') <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=5xP4
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic