info
discussion
exploit
solution
references
Monster Top List Remote Command Execution Vulnerability
Attackers can exploit this issue via a browser.
The following proof-of-concept demonstrates this issue.
/data/vulnerabilities/exploits/MTL_remotecommand.pl
Privacy Statement
Copyright 2010, SecurityFocus