Full Disclosure mailing list archives
Re: Plesk Apache Zeroday Remote Exploit
From: Milan Berger <m.berger () project-mindstorm net>
Date: Thu, 6 Jun 2013 11:41:03 +0200
Hi king cope,
Please keep headers intact.
tried your exploit on some SuSE and Debian machines, I was never able to get what I deserve, never found this phppath/php getting Error 404/403. Any suggestions? -- Kind Regards Milan Berger Project-Mindstorm Technical Engineer --- project-mindstorm.net Fruehlingstrasse 4 90537 Feucht Germany Mob.: +49 176 22987602 https://www.ghcif.de http://www.nopaste.info (for sale) https://www.digital-bit.ch http://www.project-mindstorm.net twitter: http://twitter.com/twit4c _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Plesk Apache Zeroday Remote Exploit king cope (Jun 05)
- Re: Plesk Apache Zeroday Remote Exploit Milan Berger (Jun 06)
- Re: Plesk Apache Zeroday Remote Exploit Ed Velez (Jun 06)
- <Possible follow-ups>
- Re: Plesk Apache Zeroday Remote Exploit David H (Jun 05)
- Re: Plesk Apache Zeroday Remote Exploit Kingcope (Jun 06)
- Re: Plesk Apache Zeroday Remote Exploit Kingcope (Jun 06)
- Re: Plesk Apache Zeroday Remote Exploit Kingcope (Jun 06)
- Re: Plesk Apache Zeroday Remote Exploit David H (Jun 06)
- Re: Plesk Apache Zeroday Remote Exploit アドリアンヘンドリック (Jun 06)
- Re: Plesk Apache Zeroday Remote Exploit Milan Berger (Jun 06)