Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
<html>
<head>
<title>0wned</title>
</head>
<body background="workbackground.gif" text=#000000>
<table border="0" width="232" cellpadding="10">
<tr><td width="22"></td><td width="210">
<font face="Arial, Helvetica" size="3">
<font face="Arial, Helvetica" size="4"><b>Cold Fusion Application Server Advisory</b></font><br>
A Cold Fusion vulnerability that had been previously been discussed by rain.forest.puppy in Phrack 54 is worse than originally thought. Remote users can upload, download, delete, and potentially execute files anywhere on a Cold Fusion Application Server.<p>
<a href="http://www.l0pht.com/advisories">More Information</a><br>
<a href="http://www1.allaire.com/handlers/index.cfm?ID=8727&Method=Full">Allaire Patch</a><p><br>
<font face="Arial, Helvetica" size="4"><b>eLetra(tm) has been hacked by 457</b></font><br>
Recently eLetra - Interactive and Collaborative Newsletters for the Internet has been hacked by a group which calls its self The Ant1-S3cur1ty Taskf0rce, with the well known exploit as described above. No documents were deleted in this hack and the old page can be found <a href="backup.html">here</a>. System Administrators have been notified of the bug and that they should fix it immediately.<p><br><br><br><br><br><br><br><br>
<center><font face="Arial, Helvetica" size="4"><b>And now a word from our sponsors:</b></font><br>
<img src="IcEb0mB.gif"><br>
of the:<br>
<img src="457.gif"><p>
[ btw, next time choose a subnet away from www.whitepower.com, bad karma ]<br>
[ <a href="http://www.kmfms.com">KMFMS Now!</a> or 457 later ]</center>
</font>
</td></table>
</body>
</html>