Re: [Ciotoflow] umorismo da metasploit

Borrar esta mensaxe

Responder a esta mensaxe
Autor: Agostino Sarubbo
Data:  
Para: Flussi di ciotia.
Asunto: Re: [Ciotoflow] umorismo da metasploit
On Friday 01 April 2011 12:08:16 ono-sendai wrote:
> On 01/04/2011 11:35, LordZen wrote:
> > Divertente no??
> >
> > http://www.commonexploits.com/?p=266
>
> Hahahah..penso che la tua sia una grande email per "sverginare" la lista...
> :) . Aspetto che accettino gli inviti gli altri e per questa sera mando
> una mail di riepilogo della scorsa riunione..


The URL: http://www.commonexploits.com/ is vulnerable to cross site request
forgery.

An unidentified vulnerability was found at: "http://www.commonexploits.com/wp-
comments-post.php", using HTTP method POST. The sent post-data was:
"...comment_post_ID=d'kc"z'gj'"**5*(((;-*`)...".

eval() input injection was found at: "http://www.commonexploits.com/", using
HTTP method GET. The sent data was:
"refreshRate=30&sources=sleep(9)%3B&viewMoreUrl=56&viewMoreText=view+more&tweetsNum=6".
The modified parameter was "sources".

e tante altre ancora...
Predicano bene ma razzolano male eh :D

cheers
--
Agostino Sarubbo ( ago )
Mail: ago@???
Irc: irc.freenode.net ago
Gpg: 0x7CD2DC5D
Arch Tester for Gentoo Linux amd64 http://is.gd/hcQem
Admin for HacklabCS c/o HPCC at Unical


This mail has been sent with kmail on gentoo.