[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] inject sql in utn.edu.ar



Long time ago, I have found a Remote Code Execution, Remote File Include and a 
LFI into the "mincyt" webpage (mincyt.gov.ar or something like) and I reported 
these vulns to the webmaster and to the "contact" and "info" mail address but 
don't receive any answer, so I proceed to make  public full disclosure. Then, 
people from ArCert (arcert.gov.ar) contact to me and they tells me that they 
are the "responsable team" and for the next time "please" contact with him.

So, if you want, contact with him :-) may be, they can help you and help to UCN 

Cheers,
Zerial


--
Zerial.

[nota: este correo no contiene firma PGP porque fue enviado desde un movil]

-----Original Message-----
From: CnCxzSec cncxzhack@xxxxxxxxx
Sender: full-disclosure-bounces@xxxxxxxxxxxxxxxxx
Date: Sat, 23 Apr 2011 19:57:08 
To: injec7or hell<injec7or@xxxxxxxxx>
Cc: <full-disclosure@xxxxxxxxxxxxxxxxx>
Subject: Re: [Full-disclosure] inject sql in utn.edu.ar

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/