[VIM] mxBB Module mx_profilecp 0.91 Remote File IncludeVulnerability

Heinbockel, Bill heinbockel at mitre.org
Thu Dec 14 11:08:40 EST 2006


str0ke,

Is there any way you could add a message or something
stating that the exploit was removed (and possibly a
message as to why)?

Right now if you visit http://www.milw0rm.com/exploits/2918
you see a blank page and the visitor is expected to guess
why - is it due to a backend malfunction? input error? removal?


William Heinbockel
Infosec Engineer
The MITRE Corporation
202 Burlington Rd. MS S145
Bedford, MA 01730
heinbockel at mitre.org
781-271-2615 

>-----Original Message-----
>From: vim-bounces at attrition.org 
>[mailto:vim-bounces at attrition.org] On Behalf Of str0ke
>Sent: Donnerstag, 14. Dezember 2006 09:43
>To: Vulnerability Information Managers
>Subject: [VIM] mxBB Module mx_profilecp 0.91 Remote File 
>IncludeVulnerability
>
>Removed exploit ID 2918.
>
>mxBB Module mx_profilecp 0.91 Remote File Include Vulnerability
>http://www.milw0rm.com/exploits/2918
>
>Its already listed by another author here.
>
>mxBB Module Profile CP 0.91c Remote File Include Vulnerability
>http://www.milw0rm.com/exploits/2904
>
>Best Regards,
>
>/str0ke
>


More information about the VIM mailing list