BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
[Remote Format String Exploit] Axis Communications MPQT/PACS Server Side Include (SSI) Daemon Jul 18 2016 07:24AM
bashis (mcw noemail eu)

#!/usr/bin/env python2.7
#
# [SOF]
#
# [Remote Format String Exploit] Axis Communications MPQT/PACS Server Side Include (SSI) Daemon
# Research and development by bashis <mcw noemail eu> 2016
#
# This format string vulnerability has following characteristic:
# - Heap Based (Exploiting string locat...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus