02-27-2008
S-214: SurgeMail and WebMail 'Page' Command Vulnerability
SurgeMail and WebMail are prone to a remote fomat-string vulnerability because the applications fail to properly sanitize user-supplied input begore including it in the format-specifier argument of a formatted-printing function. The risk is LOW. A remote attacker may execute arbitrary code with the privileges of the user running the affected applications. Failed exploit attempts will result in a denial of service.
More...
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi All,
When I run a command on any shell, many times the output is longer than the screen can hold, so I only can see parts of the output. Is there a command that will show me page by page the results of each command?
Thanks, Jared (3 Replies)
Discussion started by: JaredsNew
3 Replies
2. Solaris
Hi,
I would like to develop a man page as the one we usually get when we execute man <command name>. This man page will be for a samll utility that i have written.
If this is not possible then what are the available possibilites for creating such help.
thanks in advance. (2 Replies)
Discussion started by: raghu.amilineni
2 Replies
3. Shell Programming and Scripting
i have a problem situation, where i have a html file say click.html. i have a button "ls" in that html page. i run this html file in windows....Now say if i click that "ls" button it must connect to the unix server and execute ls and return the results back to html page in windows. can anyone tell... (8 Replies)
Discussion started by: niteesh_!7
8 Replies
4. UNIX for Dummies Questions & Answers
Good afternoon,
I wonder how i could use unix commands to ease the reading of long command result output ?
like the "php -i" or any other command that returns a long answer.
I could not find the right terms to Google it or search the forum. Therefore I bother you with this question.
... (3 Replies)
Discussion started by: Mat_k
3 Replies
5. Web Development
Hi
Is there a way to calculate the page load time, I am trying to calculate the load time of a page locally. I found tools to do this over http or https but none that work locally.
Any ideas?
Thanks. (4 Replies)
Discussion started by: jamie_123
4 Replies
6. Shell Programming and Scripting
Hi
I have a pdf file that is being generated using the rwrun command in the shell script.
I then have the lp command in the shell script to print the same pdf file.
Suppose there are 4 pages in the pdf file , I need to print 2 copies of the first page, 2 copies of the second page , then 2... (7 Replies)
Discussion started by: megha2525
7 Replies
7. Shell Programming and Scripting
Hi,
If there is an expert that can help:
I have many txt files that are produced from pdftotext that include page breaks the page breaks seem to be unix style hex 0C.
I want to add page numbers before each page break as in : Page XXXX
Regards antman (9 Replies)
Discussion started by: antman
9 Replies
8. Shell Programming and Scripting
This is the description of the option -print0 fon the command find in the man page:
What does the "True" in the first line of the description mean? (3 Replies)
Discussion started by: puertas12
3 Replies
9. Shell Programming and Scripting
Hi everyone,
I have two question
1- I want to execute command in shell and after execution result show in a web server. (kind of making UI )
e.g.
in shell
root ~: show list
item1
item2
item(n)in web server
in a page draw a table and show those items in itno | name... (1 Reply)
Discussion started by: indeed_1
1 Replies
LEARN ABOUT DEBIAN
themole
THEMOLE(1) General Commands Manual THEMOLE(1)
NAME
themole - automatic SQL injection exploitation tool
SYNOPSIS
themole [ -h ] [ -u url ] [ -n needle ] [-t num_threads]
DESCRIPTION
The Mole is a command line interface SQL Injection exploitation tool. This application is able to exploit both union-based and blind bool-
ean-based injections.
Every action The Mole can execute is triggered by a specific command. All this application requires in order to exploit a SQL Injection is
the URL(including the parameters) and a needle(a string) that appears in the server's response whenever the injection parameter generates a
valid query, and does not appear otherwise.
OPTIONS
-h Shows the help message and exits.
-u url Sets the url of the mole's instance to url.
-n needle
Sets the needle of the mole's instance to needle. It must be a string that appears when the injection returns true and disappears
when the injection is false.
-t threads
Sets the max number of concurrent requests that the mole will be making. Cannot be changed at runtime.
SEE ALSO
The program provides interactive documentation, refer also to the official README file.
AUTHOR
This manual page was written by Santiago Alessandri <salessandri@nasel.com.ar>
November 24 2011 THEMOLE(1)