[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Apache 2.2.17 exploit?
- To: PsychoBilly <zpamh0l3@xxxxxxxxx>
- Subject: Re: [Full-disclosure] Apache 2.2.17 exploit?
- From: Darren Martyn <d.martyn.fulldisclosure@xxxxxxxxx>
- Date: Mon, 3 Oct 2011 17:41:34 +0100
I may have to set up such an RSS + REGEX along with a google alerts to get
the best of both :)
Since my lack of computing facilities has gotten worse in the last month I
have actually begun to forget ASM, so decoding shellcode is not so easy for
me :(
Nor do I have (currently) access to a Linux box to test it on - only a
friends W7 laptop (which wants to use Cyrillic) and the college computers
(W7 also... Network booting with Novell, buggy and slow for the win!)
I will keep on posting anything that looks even mildly interesting, may find
something fun in my travels :)
On Mon, Oct 3, 2011 at 5:05 PM, PsychoBilly <zpamh0l3@xxxxxxxxx> wrote:
> OMG!
> This ...
> actually WORKS!
> GR8 Job, m8+!
> L33+ cC l33+
> W00+ FB Bwana!
> ...
> <! connection reseted by peer >
>
> [[ adam ]] @ [[ 03/10/2011 17:56
> ]]--------------------------------------------------
> > Also, make sure you guys don't miss out on this 0day either:
> http://pastebin.com/R8XdsUgK
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/