nil.enroll(aetheric_username, quantum_class_id) (adric) wrote,
nil.enroll(aetheric_username, quantum_class_id)

website princeofswords is glitched

In which I send mail to a total stranger via whois to tell them their site has likely been hit by a drive by exploit

I came across your site while searching for OmniGraffle swimlane templates, and hit your post:
While looking around I saw your post about TortoiseSVN and ScPlugin, reachable here:, but the link in your bottom menu points to:$%7Beval(base64_decode($_SERVER%5BHTTP_EXECCODE%5D))%7D%7D|.+)&%/

This is either glitch in your sites scripts or an attempt to exploit some security misfeatures in the PHP scripting language (It looks a lot like some live
exploit code I have dealt with previously. I suspect your site was attacked and may have been modified without your knowledge!). Either way you should take a look.

Sorry to bother you and I hope this helps. I didn't see any mail address listed on the site, so I used this address from Whois.

Tags: bug

  • Post a new comment


    Anonymous comments are disabled in this journal

    default userpic

    Your reply will be screened

    Your IP address will be recorded