On 4/27/2004 11:34 PM, Jason Dusek wrote:
In the course of a war hacking, I found out that one of my friend's
computers did no input validation for a search script - I could put
whole perl regular expressions in it as input. Is this an exploitable
vulnerability? What can you run inside of m//
In the course of a war hacking, I found out that one of my friend's
computers did no input validation for a search script - I could put
whole perl regular expressions in it as input. Is this an exploitable
vulnerability? What can you run inside of m// to get information about
someone else's s