Please whitelist cPanel in your adblocker so that you’re able to see our version release promotions, thanks!

The Community Forums

Interact with an entire community of cPanel & WHM users!

AWStats 6.x Multiple Remote Command Execution (Shell) Exploit

Discussion in 'General Discussion' started by SupaDucta, Mar 2, 2005.

  1. SupaDucta

    SupaDucta Active Member

    Joined:
    Oct 6, 2004
    Messages:
    40
    Likes Received:
    0
    Trophy Points:
    156
    #1 SupaDucta, Mar 2, 2005
    Last edited: Mar 2, 2005
  2. easyhoster1

    easyhoster1 Well-Known Member

    Joined:
    Sep 25, 2003
    Messages:
    659
    Likes Received:
    0
    Trophy Points:
    166
    Looks like 6.3 is fine,

    if(argc < 2){
    usage(argv);
    }

    printf("Awstats 5.7 - 6.2 exploit Shell 0.1\n");
    printf("code by omin0us\n");
    printf("dtors security group\n");
    printf(".: http://dtors.ath.cx :.\n");
    printf("--------------------------------------\n");
     
  3. SupaDucta

    SupaDucta Active Member

    Joined:
    Oct 6, 2004
    Messages:
    40
    Likes Received:
    0
    Trophy Points:
    156
    Or he was testing until 6.2, this just prints credits on screen...
     
Loading...

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice