Long time ago, I have found a Remote Code Execution, Remote File Include and a LFI into the "mincyt" webpage (mincyt.gov.ar or something like) and I reported these vulns to the webmaster and to the "contact" and "info" mail address but don't receive any answer, so I proceed to make public full disclosure. Then, people from ArCert (arcert.gov.ar) contact to me and they tells me that they are the "responsable team" and for the next time "please" contact with him.
So, if you want, contact with him :-) may be, they can help you and help to UCN Cheers, Zerial -- Zerial. [nota: este correo no contiene firma PGP porque fue enviado desde un movil] -----Original Message----- From: CnCxzSec [email protected] Sender: [email protected] Date: Sat, 23 Apr 2011 19:57:08 To: injec7or hell<[email protected]> Cc: <[email protected]> Subject: Re: [Full-disclosure] inject sql in utn.edu.ar _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
